heroui logo

Malicious InProcServer32 Modification

Splunk Security Content

View Source
Summary
This detection rule focuses on identifying processes that modify the Windows registry with a known malicious CLSID entry in the InProcServer32 key, which is commonly used by malicious actors to load harmful DLLs with the potential for executing arbitrary code. The detection is powered by logs from Endpoint Detection and Response (EDR) agents, specifically looking for registry modifications under the HKLM and HKCU Software Classes paths. This type of activity is significant as it may indicate an attempt to persist within a system or escalate privileges, thereby compromising system integrity and security. The rule can effectively reduce the risk of attackers leveraging the Windows registry to establish a foothold in target environments by preemptively identifying such modifications and alerting security teams.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1218.010
  • T1112
Created: 2024-11-13