heroui logo

Rundll32 Command Line

Anvilogic Forge

View Source
Summary
This rule targets the potential abuse of the rundll32.exe process by adversaries to execute malicious code. Rundll32.exe is often overlooked by security tools due to allowlisting and its association with legitimate operations, making it an attractive choice for threat actors aiming to evade detection. The rule specifically focuses on identifying command line executions involving rundll32.exe, which frequently serve as proxies for loading and executing malicious Dynamic Link Libraries (DLLs). By monitoring command line arguments, the rule seeks to uncover instances of potentially malicious usage that might indicate actions taken by known adversary groups such as Alloy Taurus, APT29, FIN7, and others linked with various malware strains including Conti and Trickbot. The detection logic leverages Splunk queries to filter Windows event logs for relevant event codes and extracts pertinent process details for analysis, thus aiding in the identification of security incidents related to rundll32 abuse.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1218.011
Created: 2024-02-09