heroui logo

DLLRegisterServer Called from Command Line

Anvilogic Forge

View Source
Summary
The detection rule targets instances where the DLLRegisterServer function is called from the command line, which can signify the use of malicious DLLs by threat actors such as SocGhoulish. This approach allows an attacker to bypass conventional DLL registration methods, such as regsvr32, potentially enabling stealthy execution of malicious code. The rule utilizes Splunk syntax to retrieve endpoint data and specifically looks for process calls that match the DLLRegisterServer function. It captures relevant metadata including timestamps, host, user, process details, and parent processes, and aggregates this data within one-second time bins for effective analysis. While the use of DLLRegisterServer can occur during legitimate software installations or development efforts, unexpected or suspicious invocations should prompt further investigation to determine if malicious activity is present. This rule is crucial in threat hunting and incident response operations, focusing on behavioral analysis to detect potential evasion tactics employed by attackers.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Command
ATT&CK Techniques
  • T1218.011
Created: 2024-02-09