heroui logo

Rundll32 InstallScreenSaver Execution

Sigma Rules

View Source
Summary
This rule aims to detect potential misuse of the `rundll32.exe` utility on Windows systems to execute a screen saver file (SCR) in a manner that could indicate malicious activity. `rundll32.exe` can call functions exported from dynamic-link libraries, allowing it to execute commands and applications without the traditional user interface, making it a common vehicle for attackers looking to evade detection. In this specific case, the command `rundll32.exe desk.cpl,InstallScreenSaver` is identified as a method that attackers may use to install a screensaver, which could be a guise for other malicious actions. The detection rule leverages the process creation log source to monitor for instances where `rundll32.exe` is used alongside the `InstallScreenSaver` command line argument, ensuring that both criteria are met to indicate a legitimate threat. False positives may occur during legitimate installations of screensavers, hence it is critical to corroborate detections with contextual awareness of administrative activities. This rule is significant for endpoint protection by surfacing potentially risky interactions with one of Windows' integral system executables.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1218.011
Created: 2022-04-28