HIGH Regsvr32 may have run code from an untrusted source
Detected
ID: #37078
|
Detected: 2026-01-17 00:44:04
|
Execution
Alert Overview
Process action type = execution AND target process cmd = * /i:*http*, * /i*scrobj.dll* AND target process name = regsvr32.exe
Unclassified
XDR BIOC
New
DS:PANW/XDR Agent
DOM:Security
Host Information
BOOK-R0BE6S1NC3
BOOK-R0BE6S1NC3\ubuntu
-
Process Information
Process Execution
Actor Process (Executor)
| Process Name | UltimateXdrGenerator.exe |
|---|---|
| Path | C:\app\cortex-xdr-siem-test\xdr_tools\UltimateXdrGenerator\bin\publish\UltimateXdrGenerator.exe |
| PID | 69852 |
| SHA256 |
39d630bf97d4f13b0d505838e4271408ba66362564adcb4384056f00325823bc
VT
|
| MD5 | d88d511736399b982710f6df2a155d43 |
"C:\app\cortex-xdr-siem-test\xdr_tools\UltimateXdrGenerator\bin\publish\UltimateXdrGenerator.exe" --once --scenarios 20
Action Process (Target)
| Process Name | regsvr32.exe |
|---|---|
| SHA256 |
f379c637eb2250f0cdae05918035a37f3fdf89d6b2ad897da235c5f603fe2a1e
VT
|
| Signature | Microsoft Corporation Signed |
"regsvr32.exe" /s /n /u /i:C:\Windows\Temp\test.sct scrobj.dll
Parent Process (Causality)
| Process Name | cmd.exe |
|---|---|
| Path | C:\Windows\System32\cmd.exe |
| SHA256 |
64afc6db3aad1289533662e2d79e27dd55c7dcdb8cd918b08e145ad82ad5acb4
VT
|
| MD5 | 6d109a3a00f210c1ab89c3b08399ed48 |
C:\windows\SYSTEM32\cmd.exe /c ""C:\app\cortex-xdr-siem-test\xdr_ultimate_runner.bat""
MITRE ATT&CK Mapping
Severity Analysis
HIGH
High priority investigation needed
Summary
Events
1
IP Addresses
3
Tags
2
File Artifacts
Yes
Network Artifacts
No
Registry Artifacts
No
Analyst Verdict