Skip to content

Commit

Permalink
Reg.exe Detections added
Browse files Browse the repository at this point in the history
  • Loading branch information
gbL2k committed Dec 19, 2024
1 parent e8a6894 commit fa936e0
Show file tree
Hide file tree
Showing 3 changed files with 84 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
title: OS Build Number Discovery via reg.exe
id: 9c349345-6844-4628-843f-2c8ad5967978
status: test
description: This Sigma rule detects the use of reg.exe to query the Windows registry for the operating system's build number.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1082/T1082.md#atomic-test-40---discover-os-build-number-via-registry
author: lazarg
date: 2024-12-19
tags:
- attack.discovery
- attack.T1082
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\reg.exe'
- OriginalFileName: 'reg.exe'
selection_command_line:
CommandLine|contains|all:
- 'query'
- '\SOFTWARE\Microsoft\Windows NT\CurrentVersion'
- '/v'
- 'CurrentBuildNumber'
condition: selection_img and selection_command_line
falsepositives:
- Unlikely
level: high
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
title: OS Product Name Discovery via reg.exe
id: 6c13d616-13ff-41ca-b94f-35fc294feb48
status: test
description: This Sigma rule identifies the use of reg.exe to query the Windows registry for the operating system's product name.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1082/T1082.md#atomic-test-39---discover-os-product-name-via-registry
author: lazarg
date: 2024-12-19
tags:
- attack.discovery
- attack.T1082
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\reg.exe'
- OriginalFileName: 'reg.exe'
selection_command_line:
CommandLine|contains|all:
- 'query'
- '\SOFTWARE\Microsoft\Windows NT\CurrentVersion'
- '/v'
- 'ProductName'
condition: selection_img and selection_command_line
falsepositives:
- Unlikely
level: high
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
title: Time Zone Discovery via reg.exe
id: 9090d3ad-df87-47f7-b47a-63e34e29b035
status: test
description: This Sigma rule detects the use of reg.exe to query the system's time zone information from the Windows registry.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1124/T1124.md#atomic-test-6---discover-system-time-zone-via-registry
author: lazarg
date: 2024-12-19
tags:
- attack.discovery
- attack.T1124
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\reg.exe'
- OriginalFileName: 'reg.exe'
selection_command_line:
CommandLine|contains|all:
- 'query'
- '\SYSTEM\CurrentControlSet\Control\TimeZoneInformation'
- '/v'
- 'TimeZoneKeyName'
condition: selection_img and selection_command_line
falsepositives:
- Unlikely
level: high

0 comments on commit fa936e0

Please sign in to comment.