← Back to Explore
sigmamediumHunting
Lolbin Unregmp2.exe Use As Proxy
Detect usage of the "unregmp2.exe" binary as a proxy to launch a custom version of "wmpnscfg.exe"
Detection Query
selection_img:
- Image|endswith: \unregmp2.exe
- OriginalFileName: unregmp2.exe
selection_cmd:
CommandLine|contains|windash: " /HideWMP"
condition: all of selection_*
Author
frack113
Created
2022-12-29
Data Sources
windowsProcess Creation Events
Platforms
windows
Tags
attack.defense-evasionattack.t1218
Raw Content
title: Lolbin Unregmp2.exe Use As Proxy
id: 727454c0-d851-48b0-8b89-385611ab0704
status: test
description: Detect usage of the "unregmp2.exe" binary as a proxy to launch a custom version of "wmpnscfg.exe"
references:
- https://lolbas-project.github.io/lolbas/Binaries/Unregmp2/
author: frack113
date: 2022-12-29
modified: 2024-06-04
tags:
- attack.defense-evasion
- attack.t1218
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\unregmp2.exe'
- OriginalFileName: 'unregmp2.exe'
selection_cmd:
CommandLine|contains|windash: ' /HideWMP'
condition: all of selection_*
falsepositives:
- Unknown
level: medium