heroui logo

Invoke-Obfuscation Via Use Rundll32 - PowerShell

Sigma Rules

View Source
Summary
This detection rule identifies obfuscated PowerShell commands that utilize the Rundll32.exe process to execute scripts that may indicate malicious behavior. The rule specifically looks for patterns in PowerShell script blocks that contain certain key terms and constructions associated with invoking DLLs, such as 'rundll32', 'shell32.dll', and 'shellexec_rundll'. It also checks for command components like 'invoke', 'value', and 'iex'. In order to effectively use this detection rule, Script Block Logging must be enabled on the system, allowing PowerShell to log all script and command execution details. This is crucial as it helps in capturing the relevant script blocks being executed, providing visibility into potentially malicious activity that leverages obfuscation techniques to evade standard detection mechanisms.
Categories
  • Endpoint
  • Windows
  • Cloud
Data Sources
  • Script
  • Process
Created: 2019-10-08