Detection rules › Splunk

Registry Keys Used For Privilege Escalation

Author
David Dorsey, Teoderick Contreras, Splunk, Steven Dick
Source
upstream

The following analytic detects modifications to registry keys under "Image File Execution Options" that can be used for privilege escalation. It leverages data from the Endpoint.Registry data model, specifically monitoring changes to registry paths and values like GlobalFlag and Debugger. This activity is significant because attackers can use these modifications to intercept executable calls and attach malicious binaries to legitimate system binaries. If confirmed malicious, this could allow attackers to execute arbitrary code with elevated privileges, leading to potential system compromise and persistent access.

MITRE ATT&CK coverage

TacticTechniques
PersistenceT1546.012 Event Triggered Execution: Image File Execution Options Injection
Privilege EscalationT1546.012 Event Triggered Execution: Image File Execution Options Injection

Event coverage

ProviderEvent IDTitle
Sysmon13RegistryEvent (Value Set)

Stages and Predicates

Stage 1: tstats

tstats WHERE (Registry.registry_value_name="Debugger" OR Registry.registry_value_name="GlobalFlag") Registry.registry_path="*Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options*" BY Registry.action, Registry.dest, Registry.process_guid, Registry.process_id, Registry.registry_hive, Registry.registry_path, Registry.registry_key_name, Registry.registry_value_data, Registry.registry_value_name, Registry.registry_value_type, Registry.status, Registry.user, Registry.vendor_product

Stage 2: search

search

Stage 3: where

where isnotnull(registry_value_data)

Stage 4: search

search

Stage 5: search

search

Stage 6: search

search `macro`

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
Registry.registry_patheq
  • "*Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options*" corpus 2 (splunk 2)
Registry.registry_value_nameeq
  • Debugger
  • GlobalFlag