Suspicious Process Injection to Explorer
Detects the suspicious child process of regsvr32
Sigma rule (View on GitHub)
1title: Suspicious Process Injection to Explorer
2id: ddef6008-8465-4ce6-b2ec-4e8ffef62a9a
3status: experimental
4description: Detects the suspicious child process of regsvr32
5references:
6 - https://www.trellix.com/en-us/about/newsroom/stories/research/demystifying-qbot-malware.html
7author: Adithya Chandra and Sushant Kumar Arya, Trellix
8date: 2022/04/08
9tags:
10 - attack.defense_evasion
11 - attack.t1218
12logsource:
13 category: process_creation
14 product: windows
15detection:
16 selection:
17 ParentImage|endswith: '\regsvr32.exe'
18 Image|endswith: '\explorer.exe'
19 condition: selection
20falsepositives:
21 - Unknown
22level: high```
References
Related rules
- Suspicious Calc Child Process
- DNS Query From Process with Double File Extension
- Download by Process with Double File Extension
- File Creation by Process with Double File Extension
- Network Connection From Process with Double File Extension