heroui logo

RunDLL32 Spawning Explorer

Sigma Rules

View Source
Summary
This detection rule identifies instances where the `RunDLL32.exe` process is spawning `explorer.exe` as a child process. This is considered an unusual behavior and could signify malicious activity, particularly related to the Gamarue malware, which is known to exploit this method to execute malicious payloads. The rule works by monitoring process creation events and checks whether `RunDLL32.exe` is the parent process of `explorer.exe`. Additionally, it filters results based on the `ParentCommandLine` containing the string `shell32.dll,Control_RunDLL` to reduce false positives. Detection is deemed successful when the selection criteria are met while the filter criteria are not, enabling the identification of potentially harmful activities.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-04-27