heroui logo

Remote DLL Load Via Rundll32.EXE

Sigma Rules

View Source
Summary
This detection rule identifies potentially malicious activities related to the loading of dynamic link libraries (DLLs) via the process 'rundll32.exe'. The specific behavior being monitored is when 'rundll32.exe' loads a DLL from a remote location, which is typically indicated by UNC (Universal Naming Convention) paths that start with '\\'. This is often associated with exploitation techniques used by attackers to execute code on a compromised machine by leveraging system processes. The rule monitors the ImageLoad events where 'rundll32.exe' serves as an execution vector for possibly harmful DLLs sourced from remote shares. Because of the nature of this activity – executing remote code – it carries significant security implications, thus triggering alerts that warrant immediate investigation. The expected detection environment is Windows-based systems where appropriate logging is supported.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Image
Created: 2023-09-18