Detect Registry Run Key Creation/Modification

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This analytic rule detects any registry value or key creation in the registry run keys. This could be an indication of a persistence attempt by an adversary.

Attribute Value
Type Analytic Rule
Solution Malware Protection Essentials
ID dd041e4e-1ee2-41ec-ba4e-82a71d628260
Severity Medium
Status Available
Kind Scheduled
Tactics Persistence, PrivilegeEscalation, DefenseEvasion
Techniques T1547, T1112
Required Connectors CrowdStrikeFalconEndpointProtection, MicrosoftThreatProtection, SentinelOne, VMwareCarbonBlack, CiscoSecureEndpoint, TrendMicroApexOne, TrendMicroApexOneAma
Source View on GitHub

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Malware Protection Essentials