heroui logo

Office Application Spawn Regsvr32 process

Splunk Security Content

View Source
Summary
This analytic rule has been established to detect the spawning of `Regsvr32` processes by Microsoft Office applications such as Word, Excel, and PowerPoint. This behavior is often associated with the execution of malicious macros or other forms of code injection, which can lead to significant risks including unauthorized control over the system if confirmed malicious. The detection operates by analyzing process creation events collected from various sources, specifically looking for parent processes that originate from known Office applications. The identification of this behavior is critical, especially considering its frequent use in malware campaigns like IcedID. Although this rule has been deprecated in favor of a broader analytic approach, it remains a valuable detection method for understanding specific malicious actions associated with Office applications.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1566
  • T1566.001
Created: 2025-01-13