heroui logo

RegAsm.EXE Execution Without CommandLine Flags or Files

Sigma Rules

View Source
Summary
This detection rule identifies instances where the `RegAsm.exe` executable is run without any command-line flags or specific file inputs, a situation that could signal an attempt at process injection or similar malicious activity. Typically, `RegAsm.exe` is used to convert .NET assemblies into the Windows Registry, usually requiring a DLL file or the `/help` flag to function correctly. The absence of such expected parameters may indicate that an attacker is leveraging the tool to execute code in a non-standard way, potentially aiding a covert operation. The rule focuses on monitoring process creation events on Windows systems, specifically looking for execution of `RegAsm.exe` under unusual circumstances. By capturing these specific behaviors, the detection rule aims to reduce the risk of undetected malicious activities that might go unnoticed in typical environments.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2025-06-04