Potential PendingFileRenameOperations Tampering

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detect changes to the "PendingFileRenameOperations" registry key from uncommon or suspicious images locations to stage currently used files for rename or deletion after reboot.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Registry value modified" AND (OBJECTNAME contains "\CurrentControlSet\Control\Session Manager\PendingFileRenameOperations" OR (OBJECTNAME endswith "\CurrentControlSet\Control\Session Manager" AND OBJECTVALUENAME startswith "PendingFileRenameOperations")) AND (PROCESSNAME contains "\AppData\Local\Temp\,\Users\Public" OR PROCESSNAME endswith "\reg.exe,\regedit.exe") select Action1.HOSTNAME,Action1.MESSAGE,Action1.OBJECTNAME,Action1.PROCESSNAME,Action1.PREVVAL,Action1.CHANGES

Detection

Execution Mode

realtime

Log Sources

Windows

Author

frack113