heroui logo

Detect Rundll32 Application Control Bypass - advpack

Splunk Security Content

View Source
Summary
This analytic rule is designed to detect potential application control bypass via the execution of rundll32.exe, which loads advpack.dll or ieadvpack.dll through the LaunchINFSection function. Such activity is significant because it raises the possibility of executing arbitrary code. The detection is based on Endpoint Detection and Response (EDR) telemetry that captures detailed process information along with command-line arguments. The rule analyzes processes to identify any instance of rundll32.exe trying to load potentially malicious libraries, which can be indicative of exploit techniques commonly associated with privilege escalation and evasion tactics. Upon detection, it is crucial to investigate the involved script's content and any related network communications to gauge the threat's potential impact.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • File
  • Sensor Health
ATT&CK Techniques
  • T1218
  • T1218.011
Created: 2024-12-10