
Summary
The detection rule is focused on identifying the execution of potentially malicious DLLs by the Windows Remote Auto Dialer (rasautou.exe). It leverages process creation logs from Sysmon and Windows Event Logs to flag instances where rasautou.exe is used in conjunction with suspicious command-line arguments. This behavior is particularly concerning as it represents a use of a Living Off The Land Binary (LOLBin), a technique often favored by attackers because it can evade traditional security measures. Should this activity be confirmed as malicious, it may pave the way for arbitrary code execution, privilege escalation, or maintaining persistent access to a compromised environment. To implement this detection, telemetry data from EDR solutions must be ingested and structured correctly in Splunk, ensuring alignment with the Endpoint data model for effective threat analysis.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1055.001
- T1218
- T1055
Created: 2024-12-10