heroui logo

Windows Office Product Spawned Rundll32 With No DLL

Splunk Security Content

View Source
Summary
This rule detects the behavior of Windows Office Products launching the `rundll32.exe` process without a corresponding `.dll` file. Utilizing Endpoint Detection and Response (EDR) telemetry, it examines the relationships between processes and their parent processes. Such behavior is characteristic of the IcedID malware, which could result in unauthorized code execution. When identified as malicious, this could facilitate attackers in executing arbitrary code, leading to potential data exfiltration, system compromise, or further malware proliferation. Immediate investigation is advised to contain any potential threats.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1566
  • T1566.001
Created: 2025-01-14