heroui logo

Invoke-Obfuscation RUNDLL LAUNCHER - Security

Sigma Rules

View Source
Summary
This detection rule is designed to identify the use of obfuscated PowerShell commands executed through the RUNDLL launcher, specifically focusing on Windows Event ID 4697. When PowerShell is invoked in an obfuscated manner through the use of rundll32.exe or similar services, this can indicate potential malicious activity, especially in the context of defense evasion techniques. By monitoring specific Event IDs and filtering for exec calls that involve known files like 'rundll32.exe' and 'shell32.dll', this rule aids in flagging suspicious executions that may otherwise bypass security controls. The EID 4697 logs the creation of a service, which is relevant since malicious actors may leverage service modifications to execute obfuscated command lines. To effectively utilize this rule, it's important that the 'System Security Extension' audit subcategory is enabled for comprehensive logging, enhancing the chances of capturing and analyzing relevant events in security investigations.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Application Log
  • Process
Created: 2020-10-18