heroui logo

DNS Query Request By Regsvr32.EXE

Sigma Rules

View Source
Summary
This detection rule identifies DNS queries made by the Windows executable "Regsvr32.exe". Regsvr32 is a Windows command-line utility that registers and unregisters OLE controls (i.e., DLLs) within the Windows operating system. Its legitimate use may sometimes be leveraged by attackers to bypass security measures (e.g., AppLocker) while executing malicious payloads. By monitoring DNS queries initiated by this executable, the rule aims to flag potential exploitation attempts or misuse, providing context for incident response teams to investigate further.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Network Traffic
Created: 2019-10-25