Merge PR #5660 from @swachchhanda000 - feat: add rule to detect deletion of RunMRU registry key

new: RunMRU Registry Key Deletion
new: RunMRU Registry Key Deletion - Registry
---------

Co-authored-by: Nasreddine Bencherchali <nasbench@users.noreply.github.com>
This commit is contained in:
Swachchhanda Shrawan Poudel
2025-10-22 18:31:35 +05:45
committed by GitHub
parent 3ae99cfc57
commit d36fc36e08
3 changed files with 61 additions and 0 deletions
@@ -0,0 +1,32 @@
title: RunMRU Registry Key Deletion
id: c11aecef-9c37-45a6-9c07-bc0782f963fd
related:
- id: 3a9b8c1e-5b2e-4f7a-9d1c-2a7f3b6e1c55
type: similar
status: experimental
description: |
Detects deletion of the RunMRU registry key, which stores the history of commands executed via the Run dialog.
In the clickfix techniques, the phishing lures instruct users to open a run dialog through (Win + R) and execute malicious commands.
Adversaries may delete this key to cover their tracks after executing commands.
references:
- https://www.zscaler.com/blogs/security-research/coldriver-updates-arsenal-baitswitch-and-simplefix
author: Swachchhanda Shrawan Poudel (Nextron Systems)
date: 2025-09-25
tags:
- attack.defense-evasion
- attack.t1070.003
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\reg.exe'
- OriginalFileName: 'reg.exe'
selection_cli:
CommandLine|contains|all:
- ' del'
- '\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU'
condition: all of selection_*
falsepositives:
- Unknown
level: high
@@ -0,0 +1,27 @@
title: RunMRU Registry Key Deletion - Registry
id: 3a9b8c1e-5b2e-4f7a-9d1c-2a7f3b6e1c55
related:
- id: c11aecef-9c37-45a6-9c07-bc0782f963fd
type: similar
status: experimental
description: |
Detects attempts to delete the RunMRU registry key, which stores the history of commands executed via the run dialog.
In the clickfix techniques, the phishing lures instruct users to open a run dialog through (Win + R) and execute malicious commands.
Adversaries may delete this key to cover their tracks after executing commands.
references:
- https://www.zscaler.com/blogs/security-research/coldriver-updates-arsenal-baitswitch-and-simplefix
author: Swachchhanda Shrawan Poudel (Nextron Systems)
date: 2025-09-25
tags:
- attack.defense-evasion
- attack.t1070.003
logsource:
category: registry_delete
product: windows
detection:
selection:
TargetObject|endswith: '\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU'
condition: selection
falsepositives:
- Unknown
level: high
+2
View File
@@ -134,6 +134,7 @@ logsources:
product: windows
conditions:
EventID: 12
EventType: CreateKey
rewrite:
product: windows
service: sysmon
@@ -142,6 +143,7 @@ logsources:
product: windows
conditions:
EventID: 12
EventType: DeleteKey
rewrite:
product: windows
service: sysmon