Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This analytic rule detects any registry value or key creation in the registry run keys. This could be an indication of a persistence attempt by an adversary.
| Attribute | Value |
|---|---|
| Type | Analytic Rule |
| Solution | Malware Protection Essentials |
| ID | dd041e4e-1ee2-41ec-ba4e-82a71d628260 |
| Severity | Medium |
| Status | Available |
| Kind | Scheduled |
| Tactics | Persistence, PrivilegeEscalation, DefenseEvasion |
| Techniques | T1547, T1112 |
| Required Connectors | CrowdStrikeFalconEndpointProtection, MicrosoftThreatProtection, SentinelOne, VMwareCarbonBlack, CiscoSecureEndpoint, TrendMicroApexOne, TrendMicroApexOneAma |
| Source | View on GitHub |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Analytic Rules · Back to Malware Protection Essentials