
Summary
This detection rule analyzes Windows PowerShell scripts for signs of obfuscated commands leveraging the `rundll32` utility to execute potentially malicious payloads. The `rundll32` command can be used to run DLLs as if they were executable, which often obscures the actual purpose of the command being executed. The rule specifically searches for the presence of key strings that are commonly associated with this obfuscation technique, such as `&&`, `rundll32`, `shell32.dll`, and `shellexec_rundll`. Additionally, it looks for other indicative terms like `value`, `invoke`, `comspec`, and `iex`. The detection condition is deemed high severity due to the potential for such obfuscation techniques to be used in attack scenarios, including defense evasion and execution of malicious scripts. This rule is part of a larger effort to identify and mitigate adversarial behaviors in PowerShell usage against Windows environments.
Categories
- Windows
- Endpoint
Data Sources
- Script
- Process
Created: 2019-10-08