Regasm on LOLBAS Archived: 2026-04-06 01:31:56 UTC .. /Regasm.exe Part of .NET Paths: C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regasm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe Resources: https://pentestlab.blog/2017/05/19/applocker-bypass-regasm-and-regsvcs/ https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/ https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1218.009/T1218.009.md Acknowledgements: Casey Smith (@subtee) Detections: Sigma: proc_creation_win_lolbin_regasm.yml Elastic: execution_register_server_program_connecting_to_the_internet.toml Splunk: suspicious_regsvcs_regasm_activity.md Splunk: detect_regasm_with_network_connection.yml IOC: regasm.exe executing dll file AWL bypass 1. Loads the target .NET DLL file and executes the RegisterClass function. regasm.exe file.dll Use case Execute code and bypass Application whitelisting Privileges required https://lolbas-project.github.io/lolbas/Binaries/Regasm/ Page 1 of 2 Local Admin Operating systems Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 ATT&CK® technique T1218.009: Regsvcs/Regasm Tags Execute: DLL (.NET) Execute 1. Loads the target .DLL file and executes the UnRegisterClass function. regasm.exe /U file.dll Use case Execute code and bypass Application whitelisting Privileges required User Operating systems Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 ATT&CK® technique T1218.009: Regsvcs/Regasm Tags Execute: DLL (.NET) Source: https://lolbas-project.github.io/lolbas/Binaries/Regasm/ https://lolbas-project.github.io/lolbas/Binaries/Regasm/ Page 2 of 2