EXPLORE
← Back to Explore
sigmahighHunting

Suspicious Registry Modification From ADS Via Regini.EXE

Detects the import of an alternate data stream with regini.exe, regini.exe can be used to modify registry keys.

MITRE ATT&CK

persistencedefense-evasion

Detection Query

selection_img:
  - Image|endswith: \regini.exe
  - OriginalFileName: REGINI.EXE
selection_re:
  CommandLine|re: :[^ \\]
condition: all of selection_*

Author

Eli Salem, Sander Wiebing, oscd.community

Created

2020-10-12

Data Sources

windowsProcess Creation Events

Platforms

windows

Tags

attack.persistenceattack.t1112attack.defense-evasion
Raw Content
title: Suspicious Registry Modification From ADS Via Regini.EXE
id: 77946e79-97f1-45a2-84b4-f37b5c0d8682
related:
    - id: 5f60740a-f57b-4e76-82a1-15b6ff2cb134
      type: derived
status: test
description: Detects the import of an alternate data stream with regini.exe, regini.exe can be used to modify registry keys.
references:
    - https://lolbas-project.github.io/lolbas/Binaries/Regini/
    - https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
    - https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/regini
author: Eli Salem, Sander Wiebing, oscd.community
date: 2020-10-12
modified: 2023-02-08
tags:
    - attack.persistence
    - attack.t1112
    - attack.defense-evasion
logsource:
    category: process_creation
    product: windows
detection:
    selection_img:
        - Image|endswith: '\regini.exe'
        - OriginalFileName: 'REGINI.EXE'
    selection_re:
        CommandLine|re: ':[^ \\]'
    condition: all of selection_*
falsepositives:
    - Unknown
level: high