Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary of the Pull Request
Changelog
Summary of the Pull Request
This pull request adds a new Sigma rule to detect persistence via modifications to the
HKLM\Software\Microsoft\Command Processor\AutoRun
registry key. The rule monitors both Sysmon Event ID 13 and Windows Event ID 4657 to identify suspicious modifications to the AutoRun registry value, which can be used for persistence as described in MITRE ATT&CK T1546 and demonstrated in Atomic Red Team's Atomic Test #2.Changelog
new: Persistence via CommandProcessor AutoRun Registry Key
Example Log Event
Sysmon Event (Event ID 13)
Registry value set:
RuleName: -
EventType: SetValue
UtcTime: 2025-02-23 12:36:54.674
ProcessGuid: {689153b7-1663-67bb-9d06-000000002b00}
ProcessId: 7400
Image: C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe
TargetObject: HKLM\SOFTWARE\Microsoft\Command Processor\AutoRun
Details: notepad.exe
User: VULN-WINDOWS11\robotnik
Fixed Issues
SigmaHQ Rule Creation Conventions