
Summary
This detection rule identifies potentially malicious executions of `rundll32.exe`, specifically targeting the use of the `oledb32.dll` library to open a UDL (Universal Data Link) file. Threat actors might misuse this technique to conduct phishing attacks and collect sensitive information from unsuspecting users. The detection logic specifies that the targeted execution should have `rundll32.exe` as the image executed from within an Explorer process, along with a command line that contains specific indicators related to the UDL file opening process. Notably, any executions that match these criteria will potentially signify malicious intent, as UDL files, used to manage database connections, can also provide a vector for credential harvesting and exploitation. Users should be cautious when observing any unexpected instances of this execution pattern.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2024-08-16