
Summary
The detection rule identifies suspicious executions of rundll32.exe with the command 'DllRegisterServer', a typical method used by malware authors to register potentially harmful DLL files for execution and persistence. The detection leverages multiple data sources from Endpoint Detection and Response (EDR) systems, specifically monitoring command-line arguments in process executions. Executing rundll32.exe in this manner could indicate that a malicious DLL is being registered, which could lead to unauthorized code execution, privilege escalation, or endpoint persistence. The rule functions by aggregating and analyzing events from Sysmon and Windows Event Logs, as well as third-party security tools like CrowdStrike. False positives are a concern, necessitating tuning of the detection criteria to minimize benign activities being flagged. The rule includes built-in contextual searches to explore detected instances and related risk events involving the specific user and destination system.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Windows Registry
ATT&CK Techniques
- T1218
- T1218.011
Created: 2024-11-13