Known Nylon Typhoon Registry modifications patterns

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query identifies instances where malware intentionally configures the browser settings for its use by modifying the following registry entries by Nylon Typhoon threat actor.

Attribute Value
Type Hunting Query
Solution Legacy IOC based Threat Protection
ID f090f8f4a-b986-42d2-b536-e0795c723e25
Severity Medium
Tactics Persistence
Techniques T1546.012
Required Connectors SecurityEvents, MicrosoftThreatProtection, WindowsSecurityEvents, WindowsForwardedEvents
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
Event Source == "Microsoft-Windows-Sysmon" ?
SecurityEvent ?
WindowsEvent EventID in "12,13,4657" ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Legacy IOC based Threat Protection