Suspicious Autorun Registry Modified via WMI

Last updated on:

In this page

About the rule

Rule Type

Standard

Rule Description

Detects suspicious activity where the WMIC process is used to create an autorun registry entry via reg.exe, which is often indicative of persistence mechanisms employed by malware.

Severity

Critical

Detection

Execution Mode

realtime

Log Sources

Windows

Author

@Swachchhanda Shrawan Poudel (Nextron Systems)