Lolbin Unregmp2.exe Use As Proxy
Detect usage of the "unregmp2.exe" binary as a proxy to launch a custom version of "wmpnscfg.exe"
Sigma rule (View on GitHub)
1title: Lolbin Unregmp2.exe Use As Proxy
2id: 727454c0-d851-48b0-8b89-385611ab0704
3status: test
4description: Detect usage of the "unregmp2.exe" binary as a proxy to launch a custom version of "wmpnscfg.exe"
5references:
6 - https://lolbas-project.github.io/lolbas/Binaries/Unregmp2/
7author: frack113
8date: 2022-12-29
9modified: 2024-06-04
10tags:
11 - attack.defense-evasion
12 - attack.t1218
13logsource:
14 category: process_creation
15 product: windows
16detection:
17 selection_img:
18 - Image|endswith: '\unregmp2.exe'
19 - OriginalFileName: 'unregmp2.exe'
20 selection_cmd:
21 CommandLine|contains|windash: ' /HideWMP'
22 condition: all of selection_*
23falsepositives:
24 - Unknown
25level: medium
References
Related rules
- Abusing Print Executable
- AddinUtil.EXE Execution From Uncommon Directory
- AgentExecutor PowerShell Execution
- Arbitrary DLL or Csproj Code Execution Via Dotnet.EXE
- Arbitrary File Download Via MSOHTMED.EXE