Suspicious PowerShell In Registry Run Keys

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects potential PowerShell commands or code within registry run keys

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Registry value modified" AND (OBJECTNAME contains "\Software\Microsoft\Windows\CurrentVersion\Run,\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run,\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run" OR ((OBJECTNAME endswith "\Software\Microsoft\Windows\CurrentVersion" AND OBJECTVALUENAME startswith "Run") OR (OBJECTNAME endswith "\Software\WOW6432Node\Microsoft\Windows\CurrentVersion" AND OBJECTVALUENAME startswith "Run") OR (OBJECTNAME endswith "\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" AND OBJECTVALUENAME startswith "Run"))) AND INFORMATION contains "powershell,pwsh ,FromBase64String,.DownloadFile(,.DownloadString(, -w hidden , -w 1 ,-windowstyle hidden,-window hidden, -nop , -encodedcommand ,-ExecutionPolicy Bypass,Invoke-Expression,IEX (,Invoke-Command,ICM -,Invoke-WebRequest,IWR ,Invoke-RestMethod,IRM , -noni , -noninteractive " select Action1.HOSTNAME,Action1.MESSAGE,Action1.OBJECTNAME,Action1.PROCESSNAME,Action1.PREVVAL,Action1.CHANGES

Detection

Execution Mode

realtime

Log Sources

Windows

Author

frack113, Florian Roth (Nextron Systems)