Windows Event ID 4657 — Registry Value Modified
Logged on the system where the change occurs when a registry value is created, modified, or deleted on a key that has a System Access Control List (SACL) configured for auditing. Requires the 'Audit Registry' policy to be enabled — without it, no 4657 events appear regardless of the change. 4657 is the primary detection signal for registry-based persistence, defense evasion, and privilege escalation attacks.
MITRE ATT&CK
T1547.001 · Registry Run Keys / Startup Folder
Persistence
Why It Matters
The Windows registry is an attack surface for multiple technique families: persistence via Run keys and services, defense evasion by disabling security tools or altering audit policy, UAC bypass via HKCU class hijacking, and credential access by modifying LSA settings. 4657 gives you the exact value written, who wrote it, and which process wrote it — making it one of the highest-fidelity registry attack indicators available. The key limitation: auditing must be pre-configured on the specific key path you care about. Broad registry auditing generates extreme volume; targeted SACLs on high-value paths (Run keys, Services, LSA, security tool configuration) is the practical approach.
Key Fields
Investigation Tips
- 1.Priority paths to monitor: \SOFTWARE\Microsoft\Windows\CurrentVersion\Run, \RunOnce, \SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run — any write from a non-installer process is suspicious.
- 2.Defense evasion paths: \SYSTEM\CurrentControlSet\Services\WinDefend, \SOFTWARE\Policies\Microsoft\Windows Defender — modifications here disable Defender or its components.
- 3.UAC bypass path: HKCU\SOFTWARE\Classes\ms-settings or \SOFTWARE\Classes\mscfile — these are the auto-elevate hijack targets used by fodhelper and eventvwr UAC bypasses (Event ID 4657 in the HKCU hive, no admin rights required).
- 4.LSA path: \SYSTEM\CurrentControlSet\Control\Lsa — modifications to RunAsPPL or Authentication Packages can disable LSA protection to enable credential dumping.
- 5.Compare Process Name to the expected writer: reg.exe, msiexec.exe, or a known software installer is expected; svchost.exe from AppData or an encoded PowerShell process is not.
- 6.Correlate with Event 4688 (process creation) using the same Logon ID — identify the process chain that led to the registry write.
Related Event IDs
Full Detection Guide Available
This event ID has a full detection guide with investigation steps, remediation advice, and example log entries.
View full guide for Event ID 4657 →See Event ID 4657 in your logs
Upload a Windows Event Log (.evtx) file — EventPeeker automatically detects registry value modified patterns, maps findings to MITRE ATT&CK, and generates an AI triage report.
Analyze EVTX Logs Free →