
Summary
The detection rule identifies the execution of rundll32.exe with the DLL functions "Start" and "StartW," which are often utilized by Cobalt Strike payloads. Utilizing data from Endpoint Detection and Response (EDR) agents, it examines command-line executions and process metadata to detect potential malicious activities involving rundll32.exe. This rule is crucial for recognizing unauthorized code executions initiated by attackers, allowing them to inject shellcode, escalate privileges, and maintain long-term access to compromised systems. The implementation requires appropriate ingestion of command-line execution logs and associating them with the Endpoint data model in Splunk.
Categories
- Endpoint
Data Sources
- Pod
- Container
- User Account
- Windows Registry
- Script
- Image
- Web Credential
- Named Pipe
- Certificate
- WMI
- Cloud Storage
- Internet Scan
- Persona
- Group
- Application Log
- Logon Session
- Instance
- Sensor Health
- File
- Drive
- Snapshot
- Command
- Kernel
- Driver
- Volume
- Cloud Service
- Malware Repository
- Network Share
- Network Traffic
- Scheduled Job
- Firmware
- Active Directory
- Service
- Domain Name
- Process
- Firewall
- Module
ATT&CK Techniques
- T1218
- T1218.011
Created: 2024-11-13