regsvr32-rundll32-abnormal-image-loads

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query is using the locations where malicious DLL images are often loaded from by regsvr32.dll and rundll32.exe. Blog: https://threathunt.blog/dll-image-loads-from-suspicious-locations-by-regsvr32-exe-rundll32-exe/

Attribute Value
Type Hunting Query
Solution GitHub Only
ID 69eb9fb7-fe0d-4c34-8c81-3a828fc12abd
Tactics Defense evasion
Techniques T1218.010, T1218.011
Required Connectors MicrosoftThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
DeviceFileEvents ?
DeviceImageLoadEvents ActionType in "FileCreated,FileRenamed" ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries