heroui logo

Cisco NVM - Rundll32 Abuse of MSHTML.DLL for Payload Download

Splunk Security Content

View Source
Summary
This rule titled 'Cisco NVM - Rundll32 Abuse of MSHTML.DLL for Payload Download' identifies the suspicious usage of `rundll32.exe` in conjunction with `mshtml.dll`. The situation involves the use of the `RunHTMLApplication` export, a behavior frequently exploited by malicious software to execute scripts such as JavaScript or VBScript directly in memory. This allows malware to stage payloads, circumvent script execution policies, and avoid the involvement of the more obvious `mshta.exe` binary. Utilizing telemetry from the Cisco Network Visibility Module, the detection rule monitors network flow activities alongside process data, including command-line arguments. The presence of this behavior within a system may indicate an attempt at initial access by an attacker or the download of malicious payloads. If the alerts triggered are confirmed as malicious, this indicates significant security risks and potential breaches within the network.
Categories
  • Endpoint
  • Network
Data Sources
  • Network Traffic
  • Process
ATT&CK Techniques
  • T1218.005
Created: 2025-07-03