
Summary
This detection rule identifies the execution of 'shell32.dll' in combination with 'rundll32.exe' from suspicious directories, which are commonly associated with malicious activity. The rule specifically looks for command line executions that utilize 'shell32.dll' in conjunction with 'Control_RunDLL' and are executed from paths commonly related to temporary files or user data such as %AppData%, %LocalAppData%, %Temp%, and public user directories. Such behavior could indicate an attempt to leverage legitimate Windows functionalities for defense evasion or code execution, often seen in advanced persistent threat (APT) scenarios, particularly those related to the Red Curl 2 group, as highlighted in the referenced threat research. By monitoring these specific patterns in process creation, the rule aims to enhance the detection of potentially harmful actions that could compromise system security.
Categories
- Endpoint
- Windows
Data Sources
- Process
- File
Created: 2021-11-24