SigmaHQ/rules/windows/process_creation/win_susp_regsvr32_no_dll.yml
2021-07-17 11:20:05 +02:00

31 lines
765 B
YAML

title: Regsvr32 Command Line Without DLL
id: 50919691-7302-437f-8e10-1fe088afa145
status: experimental
description: Detects a regsvr.exe execution that doesn't contain a DLL in the command line
author: Florian Roth
date: 2019/07/17
references:
- https://app.any.run/tasks/34221348-072d-4b70-93f3-aa71f6ebecad/
tags:
- attack.defense_evasion
- attack.execution
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith: '\regsvr32.exe'
filter:
CommandLine|contains:
- '.dll'
- '.ocx'
- '.cpl'
- '.ax'
condition: selection and not filter
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Unknown
level: high