Potentially Suspicious Execution Of Regasm/Regsvcs From Uncommon Location

Detects potentially suspicious execution of the Regasm/Regsvcs utilities from a potentially suspicious location

Sigma rule (View on GitHub)

 1title: Potentially Suspicious Execution Of Regasm/Regsvcs From Uncommon Location
 2id: cc368ed0-2411-45dc-a222-510ace303cb2
 3related:
 4    - id: e9f8f8cc-07cc-4e81-b724-f387db9175e4
 5      type: derived
 6status: test
 7description: Detects potentially suspicious execution of the Regasm/Regsvcs utilities from a potentially suspicious location
 8references:
 9    - https://www.fortiguard.com/threat-signal-report/4718?s=09
10    - https://lolbas-project.github.io/lolbas/Binaries/Regasm/
11    - https://lolbas-project.github.io/lolbas/Binaries/Regsvcs/
12author: Nasreddine Bencherchali (Nextron Systems)
13date: 2022/08/25
14modified: 2023/02/13
15tags:
16    - attack.defense_evasion
17    - attack.t1218.009
18logsource:
19    category: process_creation
20    product: windows
21detection:
22    selection_img:
23        - Image|endswith:
24              - '\Regsvcs.exe'
25              - '\Regasm.exe'
26        - OriginalFileName:
27              - 'RegSvcs.exe'
28              - 'RegAsm.exe'
29    selection_dir:
30        CommandLine|contains:
31            # Note: Add more potentially suspicious directories
32            - '\AppData\Local\Temp\'
33            - '\Microsoft\Windows\Start Menu\Programs\Startup\'
34            - '\PerfLogs\'
35            - '\Users\Public\'
36            - '\Windows\Temp\'
37            # - '\Desktop\'
38            # - '\Downloads\'
39    condition: all of selection_*
40falsepositives:
41    - Unknown
42level: medium

References

Related rules

to-top