heroui logo

Invoke-Obfuscation RUNDLL LAUNCHER - PowerShell Module

Sigma Rules

View Source
Summary
This detection rule focuses on identifying the use of obfuscated PowerShell scripts that leverage the RUNDLL launcher technique. The attack mechanism typically involves exploiting 'rundll32.exe' to execute PowerShell code hidden within other DLLs. By monitoring the payload for specific keywords associated with RUNDLL and PowerShell, the rule can effectively identify potentially malicious activities that evade standard security measures.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Command
Created: 2020-10-18