Detectionmediumtest

DNS Query Request By Regsvr32.EXE

Detects DNS queries initiated by "Regsvr32.exe"

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Dmitriy Lifanov, oscd.communityCreated Fri Oct 25Updated Mon Sep 1836e037c4-c228-4866-b6a3-48eb292b9955windows
Log Source
WindowsDNS Query
ProductWindows← raw: windows
CategoryDNS Query← raw: dns_query

DNS lookup events generated by endpoint monitoring tools.

Detection Logic
Detection Logic1 selector
detection:
    selection:
        Image|endswith: '\regsvr32.exe'
    condition: selection
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

Rule Metadata
Rule ID
36e037c4-c228-4866-b6a3-48eb292b9955
Status
test
Level
medium
Type
Detection
Created
Fri Oct 25
Modified
Mon Sep 18
Path
rules/windows/dns_query/dns_query_win_regsvr32_dns_query.yml
Raw Tags
attack.executionattack.t1559.001attack.defense-evasionattack.t1218.010
View on GitHub