heroui logo

Potential ShellDispatch.DLL Functionality Abuse

Sigma Rules

View Source
Summary
This detection rule identifies potential abuse of the ShellDispatch.dll functionality, particularly through the execution of arbitrary binaries using the ShellExecute method. The misuse of ShellDispatch.dll, which is a known living-off-the-land binary (LOLBin), allows attackers to execute commands and scripts in a stealthy manner, often evading detection by masquerading as legitimate system processes. The rule focuses on detecting instances where the Rundll32.exe process is invoked with specific command-line arguments that suggest misuse of ShellExecute. The key indicators for this detection include monitoring the process creation events for Rundll32.exe and looking for particular command line patterns that include 'RunDll_ShellExecuteW'. This behavior can be indicative of an attacker executing malicious payloads or scripts that leverage the legitimate functionality of Windows components to bypass security measures. The approach seeks to mitigate the risks associated with this method of execution, a common technique used in defense evasion tactics.
Categories
  • Windows
  • Endpoint
  • Application
  • Network
Data Sources
  • Process
  • Application Log
  • Command
Created: 2023-06-20