heroui logo

Control_RunDLL Call from Command Line

Anvilogic Forge

View Source
Summary
The detection rule titled 'Control_RunDLL Call from Command Line' targets the misuse of the rundll32.exe utility, which is a legitimate Windows binary often exploited by threat actors to execute control panel applets or malicious DLLs from the command line. This behavior is particularly concerning as it can serve as a method for running unwanted payloads or establishing persistence on a system while making the activity appear innocuous due to the association with system functions. Notably, the rule is designed to catch calls to Control_RunDLL via the command line, including scenarios where the rundll32.exe process has been renamed to obscure its activity. This detection leverages logs from end-user devices, focusing on identifying patterns indicative of abuse tied to techniques outlined in the MITRE ATT&CK framework, specifically those associated with system binary proxy execution (T1218). Moreover, this rule is preventive by alerting security teams of potential didactically-driven runtime threats and ensuring proactive monitoring around processes that invoke Control_RunDLL.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Command
  • Application Log
ATT&CK Techniques
  • T1218
  • T1218.011
  • T1218.002
Created: 2024-02-09