Possible DLL Injection by Regasm activity

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects the tool which is used for AWL bypass and to load the .DLL file and execute the UnRegisterClass function.

Severity

Critical

Rule Requirement

Criteria

Action1: actionname = "Process started" AND ((PARENTPROCESSNAME endswith "regasm.exe" OR PARENTPROCESSNAME endswith "regsvcs.exe" OR PROCESSNAME endswith "regasm.exe" OR PROCESSNAME endswith "regsvcs.exe" OR ORIGINALFILENAME contains "regasm" OR ORIGINALFILENAME contains "regsvcs") AND COMMANDLINE contains ".dll") select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows