heroui logo

Suspicious Rundll32 Setupapi.dll Activity

Sigma Rules

View Source
Summary
This detection rule focuses on suspicious activity involving `rundll32.exe` invoking the `setupapi.dll` library, specifically the `InstallHinfSection` function. This function is historically leveraged for processing INF files which can manipulate the Windows registry, install drivers, and execute commands. Malicious actors might exploit this feature for persistence by modifying registry keys such as `Run` or `RunOnce`, allowing their payloads to execute every time a user logs in. The rule captures evidence of this tactic by identifying processes that utilize `runonce.exe` as a child of `rundll32.exe`, combined with command-line parameters that reference `setupapi.dll` or `InstallHinfSection`. The described behavior raises flags for potential defense evasion and is pertinent as INF files can often be used for legitimate driver installations, leading to implications surrounding false positives when benign scripts or administrative tools invoke these functions. This detection aims to provide coverage against a known method of maintaining persistence through process manipulation and registry modification.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2020-10-07