
Summary
This detection rule identifies potentially malicious use of the Windows `REGSVR32.exe` utility to execute DLL files located on remote shares. This technique is often associated with attackers attempting to bypass security controls and execute remote code, notably in scenarios where a legitimate Windows utility is leveraged maliciously. The rule is structured to look for process creation events where `REGSVR32.exe` is executed and the command line parameters reference a remote path (indicated by the presence of '\\'). The rule uses criteria for both image filename and command line invocation to reduce false positives and tightly define what constitutes suspicious activity; specifically, it looks for instances where the execution is coming from a known executable and includes commands specifying remote share paths. Given the high level of threat associated with this technique, it's vital to monitor for any such occurrences, especially in an enterprise environment where security policies may be in place to mitigate misuse of system utilities. The threat mitigated by this rule is primarily relevant to Windows environments, which are particularly vulnerable to this method of attack.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-10-31