Security

Monitor Registry for reg key creation

AaronMoorcroft
Communicator

Hi Guys,

So I wish to monitor for the creation of a reg key that currently does not exist, could one of you kind folk help me out please ?

So I need to know if UserInitMprLogonScript is ever created in HKCU\Environment\

Not sure how to go about this via the inputs.conf

Thank you

0 Karma

AaronMoorcroft
Communicator

Hey Guys so I have the registry logging into Splunk now with this -

[WinRegMon://Registry]
proc = .*
hive = \REGISTRY\USER\.*
type = create|delete|set|rename
baseline = 1
index = main

but this seems to be logging lots of other changes, any ideas how I can get this to only monitor the Environment hive ? I've tried this - hive = \REGISTRY\USER\ENVIRONMENT\.* but this seems to stop everything logging then ????

0 Karma

Azeemering
Builder

Have you tried proc=.* ?

0 Karma

AaronMoorcroft
Communicator

Hi, yeah thats a typo on the above there is a ? in the Stanza, this is now working fine thank you, the next thing I need to work out is how to add multiple reg keys into the monitor without having multiple stanzas.

0 Karma

Azeemering
Builder

Why can't you define multiple stanzas? Or asked differently; What are you trying to do?

0 Karma

AaronMoorcroft
Communicator

Hi,

It's not that I cant define multiple stanzas its more a case that I would like to keep the config files small and tidy, call it OCD !!!

As for what I'm trying to do, I'm looking at creating a config file that will log everything needed for every type of attack based off of the Mitre Table attack vectors so the config files will be quite comprehensive, this will then be distributed over all the systems so I just want to keep it as simple and tidy as possible.

0 Karma

AaronMoorcroft
Communicator

Hey Guys,

ok so I managed to get this sorted in the end with the below -

[WinRegMon://Registry]
proc = .*
hive = \REGISTRY\USER\.\ENVIRONMENT\.
type = create|delete|set|rename
baseline = 1
index = main

I also set up an alert so any activity in this registry hive now sends an alert, great mitigation for some trojan's that create persistence by adding keys here

0 Karma
Get Updates on the Splunk Community!

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...

State of Splunk Careers 2024: Maximizing Career Outcomes and the Continued Value of ...

For the past four years, Splunk has partnered with Enterprise Strategy Group to conduct a survey that gauges ...

Data-Driven Success: Splunk & Financial Services

Splunk streamlines the process of extracting insights from large volumes of data. In this fast-paced world, ...