
Summary
This detection rule targets the execution of the Xwizard utility, specifically when invoked with the 'RunWizard' command line argument accompanied by a GUID format argument. The rule aims to identify potential abuse of this tool, which could be exploited to execute unauthorized Custom Object Models (COM objects) registered in the Windows registry. This behavior aligns with tactics often used by threat actors for defense evasion, allowing them to launch malicious payloads through seemingly benign processes. By monitoring the command line for both the specific 'RunWizard' call and the GUID pattern, this rule provides an effective measure to flag suspicious and potentially harmful activity that may otherwise go unnoticed in a typical environment.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2020-10-07