LOLBAS/yml/OSBinaries/regedit.yml

26 lines
1.3 KiB
YAML
Raw Normal View History

2024-09-26 23:31:47 +02:00
---
Name: regedit.exe
Description: regedit (Registry Editor) is a built-in Windows utility that allows users to view, edit, and manage the Windows Registry.
Author: Eron Clarke
Created: 2024-09-26
Commands:
- Command: regedit.exe
Description: Upon execution, regedit.exe checks two registry values at HKEY_CURRENT_USER\Software\Classes\exefile\Shell\open\command; if these are set by an attacker, the set command will be executed as a high-integrity process without a UAC prompt being displayed to the user. See 'resources' for which registry keys/values to set.
Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
Category: UAC Bypass
Privileges: User
MitreID: T1548.002
OperatingSystem: Windows 10, Windows 11
Full_Path:
- Path: C:\Windows\System32\regedit.exe
- Path: C:\Windows\SysWOW64\regedit.exe
Detection:
- IOC: Event ID 10
- IOC: A binary or script spawned as a child process of regedit.exe
- IOC: Changes to HKEY_CURRENT_USER\Software\Classes\exefile\Shell\open\command
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/registry/registry_event/registry_event_shell_open_keys_manipulation.yml
Resources:
- Link: https://gist.github.com/havoc3-3/812547525107bd138a1a839118a3a44b
Acknowledgement:
- Person: Eron Clarke