
Summary
This detection rule identifies the execution of arbitrary DLL files via the 'register-cimprovider.exe' executable on Windows systems. The usage of 'register-cimprovider.exe' can indicate defense evasion techniques, particularly in scenarios where attackers attempt to load malicious code or modules without direct visibility or suspicion. The rule focuses on process creation logs and employs specific criteria for detection: it looks for instances where the image path ends with '\register-cimprovider.exe' and the command line includes the argument '-path' followed by 'dll'. Such command line usage typically signifies an attempt to invoke a DLL through the CIM provider mechanism, which could be exploited for malicious purposes. This strategy is aligned with T1574 of the MITRE ATT&CK framework, which deals with executing code in a less detectable manner. Ultimately, monitoring this behavior can aid in uncovering potential compromises and avoiding further security incidents.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2020-10-07