T1012

Query Registry

Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software. The Registry contains a significant amount of information about the operating system, configuration, software, and security. Information can easily be queried using the Reg utility, though other means to access the Registry exist. Some of the information may help adversaries to further their operation within a network. Adversaries may use the information from Query Registry during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Threat actors including Turla (Epic), APT41 (DUSTTRAP), NOBELIUM (Sibot), Sandworm (TEARDROP), Lazarus (HOPLIGHT), Lyceum (Shark), and numerous commodity malware families leverage registry queries to fingerprint targets, locate credentials, identify installed security products, and discover network proxy configurations.

Microsoft Sentinel / Defender
kusto
let SensitiveRegistryPaths = dynamic([
    "Windows NT\\CurrentVersion",
    "HARDWARE\\DESCRIPTION\\System",
    "CurrentVersion\\Uninstall",
    "Microsoft\\Cryptography",
    "CurrentControlSet\\Services",
    "CurrentControlSet\\Control\\Lsa",
    "SimonTatham\\PuTTY\\Sessions",
    "OpenSSH\\Agent\\Keys",
    "Windows\\CurrentVersion\\Internet Settings",
    "Control\\Terminal Server",
    "Software\\Policies",
    "Bitcoin",
    "Image File Execution Options",
    "SOFTWARE\\Microsoft\\CTF",
    "Classes\\http\\shell\\open\\command",
    "CurrentVersion\\Run",
    "CurrentVersion\\RunOnce",
    "WinSCP\\Sessions"
]);
let SuspiciousInitiators = dynamic([
    "wscript.exe", "cscript.exe", "mshta.exe", "wmic.exe",
    "rundll32.exe", "regsvr32.exe", "msbuild.exe", "installutil.exe",
    "excel.exe", "winword.exe", "outlook.exe", "powerpnt.exe"
]);
// Branch 1: reg.exe query / export / save
DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName =~ "reg.exe"
| where ProcessCommandLine has_any ("query", "export", "save")
| extend TargetKey = extract(@"(?i)(HKLM|HKCU|HKEY_LOCAL_MACHINE|HKEY_CURRENT_USER|HKEY_USERS|HKU|HKCR|HKEY_CLASSES_ROOT)\\[^\s]+", 0, ProcessCommandLine)
| extend SensitivePath = ProcessCommandLine has_any (SensitiveRegistryPaths)
| extend RecursiveQuery = ProcessCommandLine has "/s" or ProcessCommandLine has "-s"
| extend SuspiciousParent = InitiatingProcessFileName has_any (SuspiciousInitiators)
| extend QueryType = "reg.exe"
| union (
    // Branch 2: PowerShell registry enumeration
    DeviceProcessEvents
    | where Timestamp > ago(24h)
    | where FileName in~ ("powershell.exe", "pwsh.exe")
    | where ProcessCommandLine has_any ("HKLM:", "HKCU:", "HKEY_LOCAL_MACHINE", "HKEY_CURRENT_USER", "Registry::")
    | where ProcessCommandLine has_any ("Get-Item", "Get-ItemProperty", "Get-ChildItem", "Get-ItemPropertyValue")
    | extend TargetKey = extract(@"(?i)(HKLM:|HKCU:|HKEY_LOCAL_MACHINE|HKEY_CURRENT_USER|Registry::HKEY)[\\\w\s]+", 0, ProcessCommandLine)
    | extend SensitivePath = ProcessCommandLine has_any (SensitiveRegistryPaths)
    | extend RecursiveQuery = ProcessCommandLine has "-Recurse"
    | extend SuspiciousParent = InitiatingProcessFileName has_any (SuspiciousInitiators)
    | extend QueryType = "PowerShell"
)
| where SensitivePath == true or SuspiciousParent == true or RecursiveQuery == true
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
         InitiatingProcessFileName, InitiatingProcessCommandLine,
         TargetKey, SensitivePath, RecursiveQuery, SuspiciousParent, QueryType
| sort by Timestamp desc
medium severity medium confidence

Data Sources

Process: Process Creation Command: Command Execution Microsoft Defender for Endpoint

Required Tables

DeviceProcessEvents

False Positives

  • IT administrators using reg.exe or PowerShell scripts for legitimate system auditing, compliance checks, or configuration validation workflows
  • Software deployment tools (SCCM, Intune, Chef, Puppet) that query registry for version checks and configuration state before deploying updates
  • System monitoring and inventory agents (SCOM, Tanium, Qualys, Tenable Nessus) that regularly enumerate installed software via the Uninstall key
  • Help desk and remote support tools (TeamViewer, ConnectWise) querying registry for diagnostic purposes during active support sessions
  • Application installers that read registry paths to detect prerequisites, conflicting software versions, or existing installation state before proceeding

Unlock Pro Content

Get the full detection package for T1012 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections