Skip to main content
T1218Defense Evasionhard difficulty

System Binary Proxy Execution

System Binary Proxy Execution (T1218) is a MITRE ATT&CK technique in the Defense Evasion tactic. SOC analysts detect it by monitoring for XDR, SIEM events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.

XDRSIEM

What is System Binary Proxy Execution?

Adversaries may bypass process and or signature-based defenses by proxying execution of malicious content with signed, or otherwise trusted, binaries. Binaries used in this technique are often Microsoft-signed files, indicating that they have been either downloaded directly from Microsoft or they are already present on the system. Common examples include using mshta.exe to execute HTA scripts, regsvr32.exe to load malicious COM scriptlets, rundll32.exe to execute exported DLL functions, msiexec.exe to run malicious MSI packages, and certutil.exe to decode and execute payloads. These techniques are collectively known as living-off-the-land binaries (LOLBins) and are attractive to attackers because they use pre-existing trusted Windows system binaries that are often whitelisted by application control solutions and that may not trigger behavioral alerts if not specifically monitored. The challenge for defenders is that these same binaries have legitimate uses, requiring careful context-aware analysis to distinguish malicious from benign usage.

System Binary Proxy Execution is documented as technique T1218 in the MITRE ATT&CK knowledge base under the Defense Evasion tactic. Detection requires visibility into XDR, SIEM telemetry.

Detection Strategies

The following detection strategies help SOC analysts identify System Binary Proxy Execution activity. These methods apply across XDR, SIEM environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.

  1. 1

    Monitor regsvr32.exe execution with network URLs or scrobj.dll in the command line, which indicates execution of remote COM scriptlets or .sct files that are commonly used to deliver and execute payloads without writing executables to disk.

  2. 2

    Alert on mshta.exe executing VBScript or JScript content from remote URLs or from files with unusual extensions, as this technique executes HTML application scripts that can perform arbitrary code execution within a trusted Microsoft-signed process.

  3. 3

    Detect rundll32.exe with unusual export function names, loading DLLs from non-system paths, or executing JavaScript through the JavaScript: protocol handler, which are abuse patterns not present in legitimate application usage.

  4. 4

    Monitor certutil.exe for download operations using -urlcache, -decode operations on files with non-standard extensions, and other usage patterns inconsistent with its intended certificate utility function.

  5. 5

    Track msiexec.exe spawning processes not typically associated with installation operations, particularly command shells and network utilities, as malicious MSI packages frequently include custom actions executing attacker-controlled commands.

Example Alerts

These realistic alert examples show what System Binary Proxy Execution looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.

HighXDR

Regsvr32 Squiblydoo Attack Executing Remote Scriptlet

regsvr32.exe executed with /s /n /u /i: flags pointing to a remote URL serving a COM scriptlet file. This technique, known as Squiblydoo, uses the trusted Windows registration server executable to download and execute arbitrary code from the internet. The scriptlet bypasses AppLocker policies that block script execution because it runs through a signed Microsoft binary rather than through a script interpreter directly.

HighXDR

MSHTA Executing Remote HTA Payload

mshta.exe process spawned by Microsoft Outlook executing a remote URL containing an HTA payload. The HTML Application file contains VBScript that downloads a Cobalt Strike stager and injects it into a legitimate process. Using mshta.exe for initial payload execution allows the attack to bypass application whitelisting and leverage the trusted MSHTA process for network connections that may not be flagged by perimeter security controls.

HighXDR

Rundll32 Loading Malicious DLL Export Function

rundll32.exe executed loading a DLL from %TEMP%\update.dll and calling the export function "DllInstall" with /i flag. The DLL is not digitally signed, was created 6 minutes prior by a PowerShell download, and its exports implement a reverse shell backdoor. Using rundll32 for execution avoids the need to run a standalone executable and allows the malicious code to execute within a trusted Windows process context.

Practice Detecting System Binary Proxy Execution

SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including System Binary Proxy Execution. Build detection skills with zero consequences — free forever.

12,000+ analysts trained
No credit card required

Frequently Asked Questions

How do SOC analysts detect System Binary Proxy Execution?
SOC analysts detect System Binary Proxy Execution (T1218) by monitoring XDR, SIEM telemetry for behavioral anomalies and specific indicators. Key detection methods include monitor regsvr32.exe execution with network urls or scrobj.dll in the command line, which indicates execution of remote com scriptlets or .sct files t. SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect System Binary Proxy Execution?
System Binary Proxy Execution can be detected using XDR, SIEM platforms. XDR tools are particularly effective for this technique because they provide visibility into the defense evasion phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is System Binary Proxy Execution in real-world attacks?
System Binary Proxy Execution is a well-documented MITRE ATT&CK technique in the Defense Evasion tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic System Binary Proxy Execution scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting System Binary Proxy Execution for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Defense Evasion techniques like System Binary Proxy Execution. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.
Glossary

What is False Positive? — SOC Glossary

A false positive is a security alert that fires on legitimate, benign activity, incorrectly classifying safe behavior as…

Read more
Glossary

What is EDR? — SOC Glossary

Endpoint Detection and Response (EDR) is a security technology that continuously monitors endpoint activity, recording p…

Read more
Glossary

What is Threat Hunting? — SOC Glossary

Threat hunting is the proactive, human-led process of searching through security telemetry to find hidden threats that e…

Read more
Glossary

What is Log Management? — SOC Glossary

Log management is the process of collecting, normalizing, storing, retaining, and analyzing log data from across the IT …

Read more
Career Path

Detection Engineer Career Guide — Salary & Skills

Detection Engineers build the rules, analytics, and automated workflows that determine what the SOC can see. You transla…

Read more
Career Path

Threat Hunter Career Guide — Salary & Skills

Threat Hunters do not wait for alerts. You develop hypotheses based on threat intelligence and adversary behavior models…

Read more
Tool

XDR Training Console — SOCSimulator

The XDR console in SOCSimulator replicates the investigation workflow of platforms like CrowdStrike Falcon, Microsoft De…

Read more
Tool

SIEM Training Console — SOCSimulator

The SIEM console in SOCSimulator replicates the workflow of enterprise platforms like Splunk Enterprise Security, Micros…

Read more
Comparison

SOCSimulator Vs. Letsdefend — Platform Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator Vs. Tryhackme — Platform Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Playbook

Suspicious Process Execution Investigation — Investigation Playbook

When XDR or EDR alerts on suspicious process execution, unusual parent-child relationships, encoded command lines, or pr…

Read more
Glossary

SOC Glossary — Security Operations Terminology

Complete glossary of Security Operations Center terminology for aspiring SOC analysts.

Read more

We use cookies to improve your experience and measure usage. Learn more