Detection rules › Sigma
New RUN Key Pointing to Suspicious Folder
Detects suspicious new RUN key element pointing to an executable in a suspicious folder
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Persistence | T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
| Privilege Escalation | T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 13 | RegistryEvent (Value Set) |
Stages and Predicates
Stage 1: selection_target
or:
TargetObject|contains: '\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run'
TargetObject|contains: '\Software\Microsoft\Windows\CurrentVersion\Run'
TargetObject|contains: '\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run'
Stage 2: selection_suspicious_paths_1
or:
Details|contains: '%AppData%'
Details|contains: '%Public%'
Details|contains: '%temp%'
Details|contains: '%tmp%'
Details|contains: ':\$Recycle.bin'
Details|contains: ':\Perflogs'
Details|contains: ':\ProgramData'''
Details|contains: ':\Temp'
Details|contains: ':\Users\Default'
Details|contains: ':\Users\public'
Details|contains: ':\Windows\Temp'
Details|contains: '\AppData\Local\Temp'
Details|contains: '\AppData\Roaming'
Stage 3: all of selection_suspicious_paths_user_1
Details|contains: ':\Users\'
Stage 4: all of selection_suspicious_paths_user_2
or:
Details|contains: '\Contacts'
Details|contains: '\Documents'
Details|contains: '\Favorites'
Details|contains: '\Favourites'
Details|contains: '\Music'
Details|contains: '\Photos'
Details|contains: '\Pictures'
Stage 5: not 1 of filter_main_windows_update
or:
Details|contains: 'C:\Windows\Temp\'
Details|contains: '\AppData\Local\Temp\'
Details|contains: 'C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32'
Details|contains: 'rundll32.exe '
Image|startswith: 'C:\Windows\SoftwareDistribution\Download\'
TargetObject|contains: '\Microsoft\Windows\CurrentVersion\RunOnce\'
Stage 6: not 1 of filter_optional_spotify
or:
Image|endswith: 'C:\Program Files (x86)\Spotify\Spotify.exe'
Image|endswith: 'C:\Program Files\Spotify\Spotify.exe'
Image|endswith: '\AppData\Roaming\Spotify\Spotify.exe'
Details|endswith: 'Spotify.exe --autostart --minimized'
TargetObject|endswith: 'SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Spotify'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
Details | ends_with |
|
Details | match |
|
Image | ends_with |
|
Image | starts_with |
|
TargetObject | ends_with |
|
TargetObject | match |
|
Neighbors
Stricter alternatives (narrower than this rule)
The rules below may be useful if you find the current rule is too noisy / lacks specificity.
- Suspicious PowerShell In Registry Run Keys (adds 1 filter)