heroui logo

Detect Regsvcs Spawning a Process

Splunk Security Content

View Source
Summary
The detection rule titled 'Detect Regsvcs Spawning a Process' is designed to identify instances where regsvcs.exe, a Windows service registration tool, spawns a child process. This behavior is atypical as regsvcs.exe rarely creates child processes, and its occurrence may indicate malicious activity, such as attempts to bypass application controls or execute arbitrary code. The detection relies on EDR telemetry, specifically capturing process creation events that have regsvcs.exe as the parent process. The analysis emphasizes the need for immediate investigation to ascertain the legitimacy of such spawned processes, as they could facilitate privilege escalation or persistent access by attackers. It leverages various data sources, including Sysmon EventID 1 and Windows Event Log Security 4688, ensuring comprehensive monitoring of endpoint activities.
Categories
  • Endpoint
Data Sources
  • Pod
  • User Account
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1218
  • T1218.009
Created: 2024-12-10