
Summary
This detection rule aims to identify suspicious executions of the 'regsvr32.exe' utility, particularly when it handles DLLs that use uncommon file extensions. Any execution of regsvr32 is a potential red flag for adversaries since this tool can be exploited to load malicious code. The rule employs a set of conditions to ascertain when regsvr32 is run and to ensure that it doesn't involve typical file extensions like '.dll', '.ocx', '.cpl', or other legitimate formats. By doing so, it mitigates false positives that may arise from legitimate processes. The detection specifically looks for instances where the CommandLine parameter does not pass these checks and raises an alert if an uncommon extension is found being executed by regsvr32. This provides defenses against potential evasion techniques leveraged by attackers to run unauthorized code on Windows-based systems.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2019-07-17