heroui logo

Regsvr32 Execution From Potential Suspicious Location

Sigma Rules

View Source
Summary
This detection rule focuses on identifying potentially suspicious execution of the 'regsvr32.exe' process, specifically when the executable is called from locations that could indicate misuse or an attempt to bypass application whitelisting measures. 'regsvr32', a legitimate Windows utility to register and unregister DLLs, can be exploited by threat actors to run malicious code. Suspicious locations include directories like %TEMP%, %PROGRAMDATA%, and other public or shared spaces that are not typical for legitimate software installations. The detection is triggered when either the image path or command line indicates usage from these typical locations, which are analyzed collectively to ensure validity of the detection. This approach aims to minimize false positives while maintaining a medium alert level for suspicious activities linked with elevated process executions.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2023-05-26