heroui logo

Suspicious Advpack Call Via Rundll32.EXE

Sigma Rules

View Source
Summary
This detection rule identifies suspicious calls made by the `rundll32.exe` process executing the `advpack.dll` library, particularly utilizing the `RegisterOCX` function. The significant risk comes from the use of potentially obfuscated ordinal calls, indicative of attempts to bypass normal security mechanisms. The rule sets conditions to trigger alerts if instances of `rundll32.exe` are observed in the command line, specifically if the command contains references to `advpack` and incorporates signs of obfuscation (e.g., the use of special characters like `#+` and `-`). Given its capability to suppress security features, execution involving `advpack.dll` should be treated with caution. This rule can assist in identifying possible attempts at malicious activities or advanced evasion techniques involving DLL hijacking or malicious script execution.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2023-05-17