Below are 2 events from the archives.json. I've redacted sensitive info.
I found these logs by doing: cat /var/ossec/logs/archives/archives.json | grep "Registry Key Entry Added to the System"
____________________________________
____________________________________
____________________________________
____________________________________
{"timestamp":"2022-07-22T14:23:47.848+0000","rule":{"level":5,"description":"Registry Key Entry Added to the System","id":"598","mitre":{"id":["T1112"],"tactic":["Defense Evasion"],"technique":["Modify Registry"]},"firedtimes":5,"mail":false,"groups":["ossec","syscheck","syscheck_entry_added","syscheck_registry"],"pci_dss":["11.5"],"gpg13":["4.13"],"gdpr":["II_5.1.f"],"hipaa":["164.312.c.1","164.312.c.2"],"nist_800_53":["SI.7"],"tsc":["PI1.4","PI1.5","CC6.1","CC6.8","CC7.2","CC7.3"]},"agent":{"id":"080","name":"REDACTED","ip":"REDACTED"},"manager":{"name":"pc-wazuh-beta"},"id":"1658499827.85054651","full_log":"Registry Key '[x64] HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\VolatileUserMgrKey\\4' added\nMode: scheduled\n","syscheck":{"path":"HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\VolatileUserMgrKey\\4","mode":"scheduled","arch":"[x64]","win_perm_after":[{"name":"TrustedInstaller","allowed":["GENERIC_ALL","DELETE","READ_CONTROL","WRITE_DAC","WRITE_OWNER","READ_DATA","WRITE_DATA","APPEND_DATA","READ_EA","WRITE_EA","EXECUTE"]},{"name":"SYSTEM","allowed":["GENERIC_ALL","DELETE","READ_CONTROL","WRITE_DAC","WRITE_OWNER","READ_DATA","WRITE_DATA","APPEND_DATA","READ_EA","WRITE_EA","EXECUTE"]},{"name":"Administrators","allowed":["GENERIC_ALL","DELETE","READ_CONTROL","WRITE_DAC","WRITE_OWNER","READ_DATA","WRITE_DATA","APPEND_DATA","READ_EA","WRITE_EA","EXECUTE"]},{"name":"Users","allowed":["GENERIC_READ","READ_CONTROL","READ_DATA","READ_EA","WRITE_EA"]},{"name":"ALL APPLICATION PACKAGES","allowed":["GENERIC_READ","READ_CONTROL","READ_DATA","READ_EA","WRITE_EA"]},{"name":"REDACTED","allowed":["GENERIC_READ","READ_CONTROL","READ_DATA","READ_EA","WRITE_EA"]}],"uid_after":"REDACTED","gid_after":"REDACTED","uname_after":"Administrators","gname_after":"SYSTEM","mtime_after":"2022-07-22T13:41:40","event":"added"},"decoder":{"name":"syscheck_registry_key_added"},"location":"syscheck"}
{"timestamp":"2022-07-22T14:30:05.643+0000","rule":{"level":5,"description":"Registry Key Entry Added to the System","id":"598","mitre":{"id":["T1112"],"tactic":["Defense Evasion"],"technique":["Modify Registry"]},"firedtimes":9,"mail":false,"groups":["ossec","syscheck","syscheck_entry_added","syscheck_registry"],"pci_dss":["11.5"],"gpg13":["4.13"],"gdpr":["II_5.1.f"],"hipaa":["164.312.c.1","164.312.c.2"],"nist_800_53":["SI.7"],"tsc":["PI1.4","PI1.5","CC6.1","CC6.8","CC7.2","CC7.3"]},"agent":{"id":"265","name":"REDACTED","ip":"REDACTED"},"manager":{"name":"pc-wazuh-beta"},"id":"1658500205.86499514","full_log":"Registry Key '[x32] HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\MpKsl1dbf4075' added\nMode: scheduled\n","syscheck":{"path":"HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\MpKsl1dbf4075","mode":"scheduled","arch":"[x32]","win_perm_after":[{"name":"Users","allowed":["GENERIC_READ","READ_CONTROL","READ_DATA","READ_EA","WRITE_EA"]},{"name":"Administrators","allowed":["GENERIC_ALL","DELETE","READ_CONTROL","WRITE_DAC","WRITE_OWNER","READ_DATA","WRITE_DATA","APPEND_DATA","READ_EA","WRITE_EA","EXECUTE"]},{"name":"SYSTEM","allowed":["GENERIC_ALL","DELETE","READ_CONTROL","WRITE_DAC","WRITE_OWNER","READ_DATA","WRITE_DATA","APPEND_DATA","READ_EA","WRITE_EA","EXECUTE"]},{"name":"CREATOR OWNER","allowed":["GENERIC_ALL"]},{"name":"ALL APPLICATION PACKAGES","allowed":["GENERIC_READ","READ_CONTROL","READ_DATA","READ_EA","WRITE_EA"]},{"name":"REDACTED","allowed":["GENERIC_READ","READ_CONTROL","READ_DATA","READ_EA","WRITE_EA"]}],"uid_after":"REDACTED","gid_after":"
REDACTED","uname_after":"Administrators","gname_after":"SYSTEM","mtime_after":"2022-07-22T07:30:05","event":"added"},"decoder":{"name":"syscheck_registry_key_added"},"location":"syscheck"}
____________________________________
____________________________________
____________________________________
____________________________________
I'm not really sure how to decode these and see what the problem could be.
How could I parse these to test with wazuh-logtest?
Thank you again for your help!