An easy to find possible indicator of compromise (IoC) for your SIEM, AEP or EDR could be a outbound network connection from Windows own register server
regsvr32.exe (
Microsoft Docs or
Wiki). Normally the register server never establishes an outbound network connection to the internet. It is a commonly used evasion technique to avoid detection and has its own MITRE Att&ck technique with ID
T1117 (or new
sub-techniques T1218/010 and can be mapped to the MITRE Att&ck tactics
Execution TA0002 and
Defense Evasion TA0005.
A starting point can be searching your SIEM logs for network connections from regsvr32.exe to a not
RFC1918 private ip address and your IPv6 address space.
Mitigations could be using the Windows firewall to block outbound network connections from regsvr32.exe or as MITRE Att&ck writes:
"
Microsoft's Enhanced Mitigation Experience Toolkit (EMET) Attack Surface
Reduction (ASR) feature can be used to block regsvr32.exe from being
used to bypass whitelisting. Identify and block potentially malicious
software executed through regsvr32 functionality by using application
whitelisting tools, like Windows Defender Application Control,
AppLocker, or Software Restriction Policies where appropriate."
More useful searches for Splunk & Sysmon environments can be found on Github, example:
https://github.com/mitre-attack/car/issues/11 and testing if your AEP/EDR/Sysmon or log-collection-tool actually logs regsvr32 events is described here:
https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1117/T1117.md