heroui logo

Rundll32 Control RunDLL World Writable Directory

Splunk Security Content

View Source
Summary
This detection rule identifies instances when `rundll32.exe` is executed with the `Control_RunDLL` command to load files from directories that are world-writable, such as `C:\Windows\Temp`, `C:\ProgramData`, or `C:\AppData`. This behavior is suspicious as it may relate to attempts to exploit vulnerabilities such as CVE-2021-40444, which could facilitate unauthorized code execution. The rule relies on telemetry from Endpoint Detection and Response (EDR) systems, particularly focusing on command-line arguments and specific file paths. By monitoring such patterns, security teams can identify potential threats, respond to incidents, and prevent attackers from gaining control over the environment.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1218
  • T1218.002
  • T1218.011
Created: 2024-12-10