11[metadata ]
22creation_date = " 2020/11/18"
3- integration = [" endpoint" ]
3+ integration = [" endpoint" , " windows " , " m365_defender " , " sentinel_one_cloud_funnel " ]
44maturity = " production"
5- updated_date = " 2024/08/07"
5+ updated_date = " 2024/10/10"
6+ min_stack_version = " 8.13.0"
7+ min_stack_comments = " Breaking change at 8.13.0 for SentinelOne Integration."
68
79[rule ]
810author = [" Elastic" ]
@@ -12,7 +14,7 @@ could be an indication of an adversary attempting to stealthily persist through
1214modification of an existing service.
1315"""
1416from = " now-9m"
15- index = [" logs-endpoint.events.registry-*" , " endgame-*" , " logs-windows.sysmon_operational-*" , " winlogbeat-*" ]
17+ index = [" logs-endpoint.events.registry-*" , " endgame-*" , " logs-windows.sysmon_operational-*" , " winlogbeat-*" , " logs-m365_defender.event-* " , " logs-sentinel_one_cloud_funnel.* " ]
1618language = " eql"
1719license = " Elastic License v2"
1820name = " Unusual Persistence via Services Registry"
@@ -28,6 +30,8 @@ tags = [
2830 " Data Source: Elastic Endgame" ,
2931 " Data Source: Elastic Defend" ,
3032 " Data Source: Sysmon" ,
33+ " Data Source: Microsoft Defender for Endpoint" ,
34+ " Data Source: SentinelOne" ,
3135]
3236timestamp_override = " event.ingested"
3337type = " eql"
@@ -39,7 +43,9 @@ registry where host.os.type == "windows" and event.type == "change" and
3943 "HKLM\\SYSTEM\\ControlSet*\\Services\\*\\ServiceDLL",
4044 "HKLM\\SYSTEM\\ControlSet*\\Services\\*\\ImagePath",
4145 "\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet*\\Services\\*\\ServiceDLL",
42- "\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet*\\Services\\*\\ImagePath"
46+ "\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet*\\Services\\*\\ImagePath",
47+ "MACHINE\\SYSTEM\\ControlSet*\\Services\\*\\ServiceDLL",
48+ "MACHINE\\SYSTEM\\ControlSet*\\Services\\*\\ImagePath"
4349 ) and not registry.data.strings : (
4450 "?:\\windows\\system32\\Drivers\\*.sys",
4551 "\\SystemRoot\\System32\\drivers\\*.sys",
0 commit comments