
Summary
This detection rule aims to identify obfuscated PowerShell executions via the RUNDLL launcher mechanism on Windows systems. The rule specifically monitors events generated by the Service Control Manager (SCM) looking for EventID 7045, which indicates a new service installation. The detection criteria are based on the presence of certain keywords in the ImagePath, suggesting the use of potentially malicious commands via `rundll32.exe` and PowerShell. If the detected path includes common obfuscation methods or suspicious files, it is flagged for further investigation. This tactic is often associated with evasion techniques employed by attackers to execute malicious scripts or commands while avoiding detection by traditional security mechanisms.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
Created: 2020-10-18