DNS Query Request By Regsvr32.EXE

Detects DNS queries initiated by "Regsvr32.exe"

Sigma rule (View on GitHub)

 1title: DNS Query Request By Regsvr32.EXE
 2id: 36e037c4-c228-4866-b6a3-48eb292b9955
 3related:
 4    - id: c7e91a02-d771-4a6d-a700-42587e0b1095
 5      type: derived
 6status: test
 7description: Detects DNS queries initiated by "Regsvr32.exe"
 8references:
 9    - https://pentestlab.blog/2017/05/11/applocker-bypass-regsvr32/
10    - https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
11author: Dmitriy Lifanov, oscd.community
12date: 2019/10/25
13modified: 2023/09/18
14tags:
15    - attack.execution
16    - attack.t1559.001
17    - attack.defense_evasion
18    - attack.t1218.010
19logsource:
20    category: dns_query
21    product: windows
22detection:
23    selection:
24        Image|endswith: '\regsvr32.exe'
25    condition: selection
26falsepositives:
27    - Unknown
28level: medium

References

Related rules

to-top