
Summary
The detection rule titled "Network Connection via Registration Utility" identifies suspicious behavior on Windows endpoints, focusing on the native Windows utilities `regsvr32.exe`, `regsvr64.exe`, `RegSvcs.exe`, and `RegAsm.exe`, particularly when they initiate network connections. This execution pattern may suggest malicious activities, such as bypassing allowlists or executing scripts under the guise of trusted binaries, thereby evading standard security measures. The rule employs a sequence-based EQL (Event Query Language) query to monitor process creation events and subsequent outbound network connections, ensuring that these actions are not from expected processes. A key aspect of the rule is its reliance on creating a baseline of typical OS behavior to identify deviations that could indicate compromise or malicious operations.
The rule also includes extensive investigation guidelines to aid analysts in exploring alerts further. Analysts are encouraged to look at correlated alerts, investigate executable file attributes for anomalies, review domain reputations contacted by processes, and assess for common indicators of compromise (IoCs). The risk score is set at 21, reflecting a low severity level, but the potential impacts warrant vigilance, as such behaviors can hide attacks aimed at data exfiltration or system compromise. False positives may arise from legitimate security testing activities, highlighting the need for contextual awareness in response workflows.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Network Traffic
- Windows Registry
ATT&CK Techniques
- T1218
- T1218.009
- T1218.010
Created: 2020-02-18