
Summary
This rule detects the execution of a program through the `pcwutl.dll` library, specifically by monitoring calls to the `LaunchApplication` function. The detection mechanism employs two main selections based on process creation metrics: one looks for specific images ending with `rundll32.exe` and checks for the `OriginalFileName` being `RUNDLL32.EXE`, while the other inspects the command line arguments for the presence of `pcwutl` and `LaunchApplication`. Notably, the rule is designed to execute if ALL of the specified selections are detected, indicating a higher confidence in identifying potential malicious activity related to code execution through this library. The use of legitimate system binaries can sometimes lead to false positives, such as when the `Program Compatibility Troubleshooter Helper` is employed.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2020-10-05