Security

Monitor Registry for reg key creation

AaronMoorcroft
Communicator

Hi Guys,

So I wish to monitor for the creation of a reg key that currently does not exist, could one of you kind folk help me out please ?

So I need to know if UserInitMprLogonScript is ever created in HKCU\Environment\

Not sure how to go about this via the inputs.conf

Thank you

0 Karma

AaronMoorcroft
Communicator

Hey Guys so I have the registry logging into Splunk now with this -

[WinRegMon://Registry]
proc = .*
hive = \REGISTRY\USER\.*
type = create|delete|set|rename
baseline = 1
index = main

but this seems to be logging lots of other changes, any ideas how I can get this to only monitor the Environment hive ? I've tried this - hive = \REGISTRY\USER\ENVIRONMENT\.* but this seems to stop everything logging then ????

0 Karma

Azeemering
Builder

Have you tried proc=.* ?

0 Karma

AaronMoorcroft
Communicator

Hi, yeah thats a typo on the above there is a ? in the Stanza, this is now working fine thank you, the next thing I need to work out is how to add multiple reg keys into the monitor without having multiple stanzas.

0 Karma

Azeemering
Builder

Why can't you define multiple stanzas? Or asked differently; What are you trying to do?

0 Karma

AaronMoorcroft
Communicator

Hi,

It's not that I cant define multiple stanzas its more a case that I would like to keep the config files small and tidy, call it OCD !!!

As for what I'm trying to do, I'm looking at creating a config file that will log everything needed for every type of attack based off of the Mitre Table attack vectors so the config files will be quite comprehensive, this will then be distributed over all the systems so I just want to keep it as simple and tidy as possible.

0 Karma

AaronMoorcroft
Communicator

Hey Guys,

ok so I managed to get this sorted in the end with the below -

[WinRegMon://Registry]
proc = .*
hive = \REGISTRY\USER\.\ENVIRONMENT\.
type = create|delete|set|rename
baseline = 1
index = main

I also set up an alert so any activity in this registry hive now sends an alert, great mitigation for some trojan's that create persistence by adding keys here

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...