Rules Contributing to Suspicious Windows Registry Event: Impact Alert
![](../../Resources/Images/Assets/Icons/520-new.png)
The following rules are used to identify suspicious Windows registry events usually in the impact stage. Any one or more of these will trigger the Suspicious Windows Registry Event: Impact Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Windows Events Required: 13
The Windows Detect Profile (Low Volume) covers these required Windows events.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
Potential Ransomware Activity Using LegalNotice Message |
Detect changes to the "LegalNoticeCaption" or "LegalNoticeText" registry values where the message set contains keywords often used in ransomware ransom messages More details
![]() Rule IDQuery{'selection': {'TargetObject|contains': ['\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\LegalNoticeCaption', '\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\LegalNoticeText']}, 'condition': 'selection'} Log SourceStellar Cyber Windows Server Sensor configured for:
Rule SourceSigmaHQ,8b9606c9-28be-4a38-b146-0e313cc232c1 Author: frack113 Tactics, Techniques, and ProceduresReferencesSeverity75 Suppression Logic Based On
Additional Information
|