
Summary
This detection rule identifies instances when `rundll32.exe` is executed with the `Control_RunDLL` command to load files from directories that are world-writable, such as `C:\Windows\Temp`, `C:\ProgramData`, or `C:\AppData`. This behavior is suspicious as it may relate to attempts to exploit vulnerabilities such as CVE-2021-40444, which could facilitate unauthorized code execution. The rule relies on telemetry from Endpoint Detection and Response (EDR) systems, particularly focusing on command-line arguments and specific file paths. By monitoring such patterns, security teams can identify potential threats, respond to incidents, and prevent attackers from gaining control over the environment.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1218
- T1218.002
- T1218.011
Created: 2024-12-10