
Summary
This detection rule identifies the usage of the 'unregmp2.exe' binary as a proxy to execute a modified version of 'wmpnscfg.exe', which is commonly associated with evasion techniques. The rule is particularly effective in environments where 'unregmp2.exe' might be used legitimately, thus highlighting its exploitation in attacks. The detection is based on process creation logs and may flag unusual command line arguments or file execution patterns typical for malicious activities. This rule is part of a broader suite focusing on defense evasion tactics, particularly those that utilize legitimate tools to achieve malicious objectives. The use of the 'unregmp2.exe' file, often overlooked, signifies a higher risk, especially when combined with specific command line actions, indicating an attacker’s potential attempt to bypass security measures.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-12-29