heroui logo

Regsvr32 Silent and Install Param Dll Loading

Splunk Security Content

View Source
Summary
This detection rule identifies instances of the `regsvr32` application being invoked with the silent parameter and the DLLInstall execution option. Such behavior is frequently associated with Remote Access Trojans (RAT) like Remcos and njRAT which leverage this method to inject malicious DLLs into the system, enabling them to execute arbitrary code, establish persistence, and further compromise the affected system. The detection is based on command-line argument analysis sourced from Endpoint Detection and Response (EDR) telemetry, specifically through Windows Event Logs (Event ID 4688) and Sysmon logs. By filtering for specific process behaviors, the analytic aims to alert on potential malicious activity typical of DLL injection techniques employed by adversaries.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1218
  • T1218.010
  • T1059.005
Created: 2024-11-13