
Rule Info
Name
Scripting/CommandLine Process Spawned Regsvr32
Author
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Description
Detects various command line and scripting engines/processes such as "PowerShell", "Wscript", "Cmd", etc. spawning a "regsvr32" instance.
Date
2023-05-26 00:00:00
Modified
None
Id
ab37a6ec-6068-432b-a64e-2c7bf95b1d22
Tags
attack.defense-evasion attack.t1218.010
Type
Community Rule
Link to Public Repo
Rule History
Author
Title
Date
Commit
Nasreddine Bencherchali
Merge PR #4950 from @nasbench - Comply With v2 Spec Changes
2024-08-12
github-actions[bot]
Merge PR #4791 from @nasbench - Promote older rules status from `experimental` to `test`
2024-04-01