
Summary
This detection rule is designed to identify potentially suspicious activity involving the Windows utility 'regsvr32.exe'. Regsvr32 is commonly used for registering and deregistering OLE controls, such as DLLs, but can also be misused by attackers to download and execute malicious DLLs from web or FTP servers. The rule triggers if regsvr32 is executed with flags that suggest it is installing a DLL from an internet source, indicated by command line arguments containing '-i' or '/i', along with the presence of 'http' or 'ftp'. The composition of the detection logic ensures that both the execution of regsvr32 from a legitimate process and the specific command line characteristics are checked, thus minimizing false positives.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2023-05-24