Skip to content

Commit a31fb00

Browse files
authored
[Rule Tuning] Check if registry.data.strings is null on exclusion-based logic (#5193)
1 parent 49637fb commit a31fb00

4 files changed

+9
-8
lines changed

rules/windows/defense_evasion_lsass_ppl_disabled_registry.toml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/05/27"
33
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/08/26"
5+
updated_date = "2025/10/07"
66

77
[rule]
88
author = ["Elastic"]
@@ -81,7 +81,8 @@ type = "eql"
8181

8282
query = '''
8383
registry where host.os.type == "windows" and event.type == "change" and
84-
registry.value : "RunAsPPL" and registry.path : "*\\SYSTEM\\*ControlSet*\\Control\\Lsa\\RunAsPPL" and
84+
registry.data.strings != null and registry.value : "RunAsPPL" and
85+
registry.path : "*\\SYSTEM\\*ControlSet*\\Control\\Lsa\\RunAsPPL" and
8586
not registry.data.strings : ("1", "0x00000001", "2", "0x00000002")
8687
'''
8788

rules/windows/defense_evasion_reg_disable_enableglobalqueryblocklist.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/05/31"
33
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/08/26"
5+
updated_date = "2025/10/07"
66

77
[rule]
88
author = ["Elastic"]
@@ -84,7 +84,7 @@ timestamp_override = "event.ingested"
8484
type = "eql"
8585

8686
query = '''
87-
registry where host.os.type == "windows" and event.type == "change" and
87+
registry where host.os.type == "windows" and event.type == "change" and registry.data.strings != null and
8888
(
8989
(registry.value : "EnableGlobalQueryBlockList" and registry.data.strings : ("0", "0x00000000")) or
9090
(registry.value : "GlobalQueryBlockList" and not registry.data.strings : "wpad")

rules/windows/persistence_services_registry.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/11/18"
33
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/08/18"
5+
updated_date = "2025/10/07"
66

77
[rule]
88
author = ["Elastic"]
@@ -79,7 +79,7 @@ type = "eql"
7979

8080
query = '''
8181
registry where host.os.type == "windows" and event.type == "change" and
82-
registry.value : ("ServiceDLL", "ImagePath") and
82+
registry.data.strings != null and registry.value : ("ServiceDLL", "ImagePath") and
8383
registry.path : (
8484
"HKLM\\SYSTEM\\ControlSet*\\Services\\*\\ServiceDLL",
8585
"HKLM\\SYSTEM\\ControlSet*\\Services\\*\\ImagePath",

rules/windows/privilege_escalation_reg_service_imagepath_mod.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/06/05"
33
integration = ["endpoint", "windows", "crowdstrike", "sentinel_one_cloud_funnel", "m365_defender"]
44
maturity = "production"
5-
updated_date = "2025/08/26"
5+
updated_date = "2025/10/07"
66

77
[rule]
88
author = ["Elastic"]
@@ -82,7 +82,7 @@ type = "eql"
8282

8383
query = '''
8484
registry where host.os.type == "windows" and event.type == "change" and process.executable != null and
85-
registry.value == "ImagePath" and
85+
registry.data.strings != null and registry.value == "ImagePath" and
8686
registry.key : (
8787
"*\\ADWS", "*\\AppHostSvc", "*\\AppReadiness", "*\\AudioEndpointBuilder", "*\\AxInstSV", "*\\camsvc", "*\\CertSvc",
8888
"*\\COMSysApp", "*\\CscService", "*\\defragsvc", "*\\DeviceAssociationService", "*\\DeviceInstall", "*\\DevQueryBroker",

0 commit comments

Comments
 (0)