heroui logo

CobaltStrike Load by Rundll32

Sigma Rules

View Source
Summary
This detection rule targets the usage of Rundll32.exe to load potentially malicious dynamic link libraries (DLLs) associated with the Cobalt Strike framework. Cobalt Strike, a legitimate penetration testing tool, can be misused by adversaries, and its capabilities include leveraging Rundll32 for loading DLLs through the command line using the 'StartW' function. The rule examines the process creation events for instances of Rundll32 that include '.dll' in the command line arguments and check for the presence of either 'StartW' or variations in the command line that might indicate the execution of Cobalt Strike payloads. If both the selection criteria and command line parameters match, an alert is triggered, potentially indicating malicious activity. The intended use case of this rule is to identify and mitigate threats posed by Cobalt Strike remote access techniques before the execution of harmful payloads or actions can occur.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2021-06-01