heroui logo

Rundll32 Process Creating Exe Dll Files

Splunk Security Content

View Source
Summary
This detection rule targets the malicious activity involving the `rundll32` process, specifically when it creates executable (.exe) or dynamic link library (.dll) files, leveraging Sysmon's EventCode 11. The `rundll32.exe` process is often manipulated by malware, including threats like IcedID, to deploy harmful payloads into sensitive directories such as Temp, AppData, or ProgramData. By triggering on such events, the rule aims to identify instances where potentially malicious files are created, which could enable an attacker to execute arbitrary code, establish persistence in the system, or escalate their privileges. The implementation of this rule requires the use of Sysmon and proper log ingestion, ensuring that any known benign usages are filtered to reduce false positives. The rule's search query aggregates counts of such occurrences and timestamps for further analysis.
Categories
  • Endpoint
Data Sources
  • Pod
  • Process
  • File
ATT&CK Techniques
  • T1218
  • T1218.011
Created: 2024-11-13