
Summary
This rule is designed to detect anomalies in the command line usage of the Windows 'regsvr32' utility, specifically focusing on the usage of the '/i' flag without the accompanying '/n' flag. The '/i' flag is used to invoke a specific behavior, whereas the '/n' flag is commonly used to indicate that no DLL should be registered. The detection logic is structured to identify instances where regsvr32 is executed with the '/i' flag but not the '/n' flag, which, according to common usage patterns, is unusual and potentially indicative of malicious activity or misconfiguration. This detection can help in identifying advanced persistent threats that attempt to bypass security controls by exploiting legitimate system binaries.
Categories
- Windows
Data Sources
- Process
Created: 2019-07-13