Skip to content

Commit 168bf7e

Browse files
committed
Update windows_sensitive_registry_hive_dump_via_commandline.yml
1 parent 46c079b commit 168bf7e

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

detections/endpoint/windows_sensitive_registry_hive_dump_via_commandline.yml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Windows Sensitive Registry Hive Dump Via CommandLine
22
id: 5aaff29d-0cce-405b-9ee8-5d06b49d045e
3-
version: 5
4-
date: '2025-05-02'
3+
version: 6
4+
date: '2025-06-02'
55
author: Michael Haag, Patrick Bareiss, Nasreddine Bencherchali, Splunk
66
status: production
77
type: TTP
@@ -20,8 +20,9 @@ data_source:
2020
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
2121
as lastTime from datamodel=Endpoint.Processes where ((`process_reg` Processes.process
2222
IN ("*save*", "*export*")) OR (`process_regedit` Processes.process IN ("*/E *",
23-
"*-E *"))) AND Processes.process IN ("*HKEY_LOCAL_MACHINE*", "*HKLM*") AND Processes.process
24-
IN ("*SAM*", "*System*", "*Security*") by Processes.action Processes.dest Processes.original_file_name
23+
"*-E *"))) AND Processes.process IN ("*HKEY_LOCAL_MACHINE\SAM*", "*HKEY_LOCAL_MACHINE\System*",
24+
"*HKEY_LOCAL_MACHINE\Security*", "*HKLM\SAM*", "*HKLM\System*", "*HKLM\Security*")
25+
by Processes.action Processes.dest Processes.original_file_name
2526
Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid
2627
Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path
2728
Processes.process Processes.process_exec Processes.process_guid Processes.process_hash

0 commit comments

Comments
 (0)