heroui logo

Windows MSIExec Unregister DLLRegisterServer

Splunk Security Content

View Source
Summary
The detection rule captures instances where the Windows MSIExec utility is invoked with the /z switch, which is used to unload the DLLRegisterServer. This behavior may indicate an attempt to deregister a DLL, which could lead to service disruptions or concealment of malicious activities. The rule utilizes data from Endpoint Detection and Response (EDR) agents, focusing on process execution logs, specifically monitoring command-line arguments for signs of misuse. Potential outcomes of this activity include disabling security controls and evading detection, thereby allowing attackers to further compromise the system's integrity. This detection mechanism helps security teams identify suspicious behaviors linked to DLL manipulation, aiding in the prevention of critical security threats.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1218.007
Created: 2024-11-13