Robuta

Sponsor of the Day: Jerkmate
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_schtasks_reg_loader_encoded/ Scheduled Task Executing Encoded Payload from Registry | Detection.FYI Detects the creation of a schtask that potentially executes a base64 encoded payload stored in the Windows Registry using PowerShell. registry detection fyischeduled taskexecutingencodedpayload https://detection.fyi/sigmahq/sigma/emerging-threats/2020/malware/blue-mockingbird/registry_set_mal_blue_mockingbird/ Blue Mockingbird - Registry | Detection.FYI Attempts to detect system changes made by Blue Mockingbird registry detection fyiblue mockingbird https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_uac_bypass_wmp/ UAC Bypass Using Windows Media Player - Registry | Detection.FYI Detects the pattern of UAC Bypass using Windows Media Player osksupport.dll (UACMe 32) windows media playerregistry detection fyiuac bypassusing https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_schtasks_reg_loader/ Scheduled Task Executing Payload from Registry | Detection.FYI Detects the creation of a schtasks that potentially executes a payload stored in the Windows Registry using PowerShell. registry detection fyischeduled taskexecutingpayload https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_add_local_hidden_user/ Creation of a Local Hidden User Account by Registry | Detection.FYI Sysmon registry detection of a local hidden user account. registry detection fyiuser accountcreationlocalhidden https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_add_load_service_in_safe_mode/ Registry Persistence via Service in Safe Mode | Detection.FYI Detects the modification of the registry to allow a driver or service to persist in Safe Mode. persistence viasafe modedetection fyiregistryservice https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_vulnerable_driver_blocklist_registry_tampering/ Vulnerable Driver Blocklist Registry Tampering Via CommandLine | Detection.FYI Detects tampering of the Vulnerable Driver Blocklist registry via command line tools such as PowerShell or REG.EXE. The Vulnerable Driver Blocklist is a … commandline detection fyitampering viavulnerabledriverblocklist https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_credential_guard_registry_tampering/ Windows Credential Guard Registry Tampering Via CommandLine | Detection.FYI Detects attempts to add, modify, or delete Windows Credential Guard related registry keys or values via command line tools such as Reg.exe or PowerShell. … commandline detection fyiwindows credentialtampering viaguardregistry https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_persistence_mycomputer/ Potential Persistence Via MyComputer Registry Keys | Detection.FYI Detects modification to the potential persistence viaregistry keysdetection fyi https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_susp_atbroker_change/ Atbroker Registry Change | Detection.FYI Detects creation/modification of Assistive Technology applications and persistence with usage of 'at' change detectionregistryfyi https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_windows_defender_tamper/ Suspicious Windows Defender Registry Key Tampering Via Reg.EXE | Detection.FYI Detects the usage of exe detection fyisuspicious windowsregistry keytampering viadefender https://detection.fyi/sigmahq/sigma/windows/registry/registry_event/registry_event_redmimicry_winnti_reg/ RedMimicry Winnti Playbook Registry Manipulation | Detection.FYI Detects actions caused by the RedMimicry Winnti playbook detection fyiplaybookregistrymanipulation https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_lsa_disablerestrictedadmin/ RestrictedAdminMode Registry Value Tampering | Detection.FYI Detects changes to the detection fyiregistryvaluetampering https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/apt32-oceanlotus/registry_event_apt_oceanlotus_registry/ OceanLotus Registry Activity | Detection.FYI Detects registry keys created in OceanLotus (also known as APT32) attacks activity detection fyiregistry https://detection.fyi/sigmahq/sigma/application/rpc_firewall/rpc_firewall_remote_registry_lateral_movement/ Remote Registry Lateral Movement | Detection.FYI Detects remote RPC calls to modify the registry and possible execute code lateral movement detectionremoteregistryfyi https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_registry_special_accounts_hide_user/ Hiding User Account Via SpecialAccounts Registry Key - CommandLine | Detection.FYI Detects changes to the registry key commandline detection fyiuser accountregistry keyhidingvia