Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_lolbin_regasm.yml
T
Nasreddine Bencherchali 27aac97639 feat: updates and enhancements
2023-02-14 00:51:20 +01:00

49 lines
1.5 KiB
YAML

title: Regasm/Regsvcs Suspicious Execution
id: cc368ed0-2411-45dc-a222-510ace303cb2
status: experimental
description: Detects suspicious execution of Regasm/Regsvcs utilities
references:
- https://www.fortiguard.com/threat-signal-report/4718?s=09
- https://lolbas-project.github.io/lolbas/Binaries/Regasm/
- https://lolbas-project.github.io/lolbas/Binaries/Regsvcs/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022/08/25
modified: 2023/02/13
tags:
- attack.defense_evasion
- attack.t1218.009
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith:
- '\Regsvcs.exe'
- '\Regasm.exe'
- OriginalFileName:
- 'RegSvcs.exe'
- 'RegAsm.exe'
selection_dir:
CommandLine|contains:
# Add more suspicious directories
- '\Users\Public\'
- '\AppData\Local\Temp\'
- '\Desktop\'
- '\Downloads\'
- '\PerfLogs\'
- '\Windows\Temp\'
- '\Microsoft\Windows\Start Menu\Programs\Startup\'
filter_dll:
CommandLine|contains: '.dll'
filter_no_cli:
# For when the CLI just contains the Image
CommandLine|endswith:
- '\Regasm.exe"'
- '\Regasm.exe'
- '\Regsvcs.exe"'
- '\Regsvcs.exe'
condition: all of selection_* or (selection_img and not 1 of filter_*)
falsepositives:
- Unknown
level: high