heroui logo

Remote Thread Creation Via PowerShell In Uncommon Target

Sigma Rules

View Source
Summary
This detection rule focuses on identifying the creation of remote threads by PowerShell processes targeting uncommon or suspicious processes, specifically `rundll32.exe` and `regsvr32.exe`. It leverages the capabilities of PowerShell, which can be exploited by attackers for executing malicious code in the context of legitimate system processes. The rule is set to trigger when remote thread creation is initiated from either `powershell.exe` or `pwsh.exe` targeting these specified processes. Notably, both `rundll32.exe` and `regsvr32.exe` are commonly utilized for executing DLLs, but in this context, their use is flagged as potentially malicious due to the remote thread creation activity originating from PowerShell. Understanding and mitigating this kind of behavior is crucial as it can signify attempts to evade detection systems by threading into processes that may not be closely monitored. This rule is relevant for organizations looking to enhance their visibility and response capabilities against techniques employed by attackers, particularly those utilizing PowerShell for lateral movement or to execute payloads stealthily.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Application Log
Created: 2018-06-25