Suspicious Autorun Registry Modified via WMI
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects suspicious activity where the WMIC process is used to create an autorun registry entry via reg.exe, which is often indicative of persistence mechanisms employed by malware.
Severity
Critical
Detection
Execution Mode
realtime
Log Sources
Windows
Author
@Swachchhanda Shrawan Poudel (Nextron Systems)


