heroui logo

WebDav Client Execution Via Rundll32.EXE

Sigma Rules

View Source
Summary
This detection rule identifies the execution of the 'rundll32.exe' process by 'svchost.exe', specifically when it is invoked with arguments pointing to 'C:\windows\system32\davclnt.dll,DavSetCookie'. This behavior is indicative of potential code execution through WebDav, which could be a method used by attackers to facilitate data exfiltration or remote command execution. The rule is structured to monitor process creation events in a Windows environment, targeting scenarios where a legitimate system process spawns another process in an atypical context, signifying a potential security concern. The correlation of parent and child processes, along with specific command line arguments, enables a more accurate detection mechanism against sophisticated attack techniques. This rule is part of ongoing efforts in the field of threat hunting, focusing on signs of malicious activity linked to the exploitation of WebDav functionalities. It's essential for security analysts to evaluate this detection in conjunction with additional context to minimize false positives, which may arise in legitimate operational scenarios.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2020-05-02