
Summary
This analytic rule detects the suspicious behavior of rundll32.exe creating remote threads in various browser processes, including firefox.exe, chrome.exe, iexplore.exe, and microsoftedgecp.exe. It utilizes Sysmon's EventCode 8 to monitor and correlate the SourceImage and TargetImage fields, indicating that this type of activity is often linked to malware like IcedID, which targets browser applications to siphon off sensitive user data, particularly banking information. The detection helps preemptively identify potential malware infection stemming from elevated privileges and provides essential insights into suspicious inter-process communications that could lead to financial theft or breaches of user privacy.
Categories
- Endpoint
Data Sources
- Pod
- Container
- User Account
- Windows Registry
- Script
- Image
- Web Credential
- Named Pipe
- Certificate
- WMI
- Cloud Storage
- Internet Scan
- Persona
- Group
- Application Log
- Logon Session
- Instance
- Sensor Health
- File
- Drive
- Snapshot
- Command
- Kernel
- Driver
- Volume
- Cloud Service
- Malware Repository
- Network Share
- Network Traffic
- Scheduled Job
- Firmware
- Active Directory
- Service
- Domain Name
- Process
- Firewall
- Module
ATT&CK Techniques
- T1055
Created: 2024-11-13