2021-05-27 15:49:10 +00:00
title : Suspicious Process Start Without DLL
id : f5647edc-a7bf-4737-ab50-ef8c60dc3add
description : Detects suspicious start of program that usually requires a DLL as parameter, which can be a sign of process injection or hollowing activity
status : experimental
references :
- https://twitter.com/CyberRaiju/status/1251492025678983169
- https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/regsvr32
- https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/rundll32
- https://docs.microsoft.com/en-us/dotnet/framework/tools/regasm-exe-assembly-registration-tool
- https://docs.microsoft.com/en-us/dotnet/framework/tools/regsvcs-exe-net-services-installation-tool#feedback
author : Florian Roth
date : 2021 /05/27
logsource :
category : process_creation
product : windows
detection :
selection :
CommandLine|endswith :
- '\rundll32.exe'
- '\regsvcs.exe'
- '\regasm.exe'
- '\regsvr32.exe'
filter1 :
ParentImage|contains :
2021-05-27 16:12:20 +00:00
- '\AppData\Local\'
2021-05-27 15:49:10 +00:00
- '\Microsoft\Edge\'
condition : selection and not filter1
fields :
- ParentImage
- ParentCommandLine
falsepositives :
- Possible but rare
level : high