← Back to Explore
sigmalowHunting
Shell Context Menu Command Tampering
Detects changes to shell context menu commands. Use this rule to hunt for potential anomalies and suspicious shell commands.
Detection Query
selection:
TargetObject|contains|all:
- \Software\Classes\
- \shell\
- \command\
condition: selection
Author
Nasreddine Bencherchali (Nextron Systems)
Created
2024-03-06
Data Sources
windowsRegistry Set Events
Platforms
windows
Tags
attack.persistencedetection.threat-hunting
Raw Content
title: Shell Context Menu Command Tampering
id: 868df2d1-0939-4562-83a7-27408c4a1ada
status: test
description: Detects changes to shell context menu commands. Use this rule to hunt for potential anomalies and suspicious shell commands.
references:
- https://mrd0x.com/sentinelone-persistence-via-menu-context/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2024-03-06
tags:
- attack.persistence
- detection.threat-hunting
logsource:
category: registry_set
product: windows
detection:
selection:
TargetObject|contains|all:
- '\Software\Classes\'
- '\shell\'
- '\command\'
condition: selection
falsepositives:
- Likely from new software installation suggesting to add context menu items. Such as "PowerShell", "Everything", "Git", etc.
level: low