heroui logo

Windows Application Whitelisting Bypass Attempt via Rundll32

Splunk Security Content

View Source
Summary
This analytic rule detects potential attempts to bypass Windows application whitelisting using the 'rundll32.exe' process. Specifically, it observes instances where 'rundll32.exe' invokes certain DLLs (Advpack.dll, Ieadvpack.dll, Syssetup.dll, Setupapi.dll) and calls specific functions ('LaunchINFSection', 'InstallHinfSection', 'SetupInfObjectInstallAction'). Such behavior is indicative of malware or unauthorized scripts trying to execute commands that are usually restricted under application control policies. The analysis is centered around telemetry from Endpoint Detection and Response (EDR) systems, analyzing command-line parameters and process execution details. If detected, this can indicate malicious activity that could lead to wider security breaches, including privilege escalation or persistent threats. Therefore, additional investigations are necessary to assess any related processes, network behavior, and the contents of any scripts involved.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1218
  • T1218.011
Created: 2025-10-06