win_susp_regsvr32_flags_anomaly.yml #3674
-
Hello, I believe there may be some misunderstanding with regard to the flags chosen for detection in this rule, the Twitter reference does not seem to fully understand them. We would want to detect use of the /n flag, not exclude it, because an attacker would want to use it in order to avoid modifying Windows Registry and risking detection. Regsvr32's /n flag prevents the functions "DllRegisterServer" and "DllUnregisterServer" from being called. These functions create or remove DLL entries from Registry. Such activity would likely be picked up by an EDR solution. Use of the /n flag would help an attacker remain undetected by avoiding any modification to Registry. Should this rule be rewritten to include detection of the /n flag, as opposed to filtering it out as it is currently? Thank you. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 6 replies
-
Hi, In theTwitter https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/cobalt_upd_ttps/ the malware use only |
Beta Was this translation helpful? Give feedback.
Hi,
for proc_creation_win_susp_regsvr32_flags_anomaly.yml :
The normal behavior is
/i /n
We want to detect when use with only
/i
.In theTwitter https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/cobalt_upd_ttps/ the malware use only
/s /i