
Summary
This detection rule identifies instances where the executable "RegAsm.exe" establishes a network connection to public IP addresses. Given that RegAsm.exe is a utility for registering .NET assemblies, its unexpected use for initiating internet connections can be indicative of potentially malicious activity or abuse, such as data exfiltration or remote access setup. The rule looks for processes initiated by RegAsm.exe and verifies their outbound connections against a set of known private IP address ranges, flagging any connections that attempt to reach public IPs. This could represent an attempt to bypass local network security measures and communicate with external servers.
Categories
- Network
- Endpoint
- Windows
Data Sources
- Process
- Network Traffic
Created: 2024-04-25