heroui logo

Detect Regsvr32 Application Control Bypass

Splunk Security Content

View Source
Summary
The detection rule identifies the misuse of Regsvr32.exe to potentially execute malicious code by loading the "scrobj.dll". This process is particularly insidious as Regsvr32.exe is a trusted Microsoft binary frequently exploited in attacks where application control is bypassed, notably through techniques like "Squiblydoo". The detection relies on data captured by Endpoint Detection and Response (EDR) agents, analyzing events related to process creation and command-line arguments. This rule focuses on identifying suspicious process activity that could indicate an attempted compromise, allowing for rapid incident response if confirmed to be malicious. The rule encompasses relevant Sysmon Event ID 1 and Windows Event Log Security events to trace the nefarious use of this legitimate tool, facilitating enhanced security strategies against such evasive tactics.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
  • Scheduled Job
ATT&CK Techniques
  • T1218
  • T1218.010
Created: 2024-12-10