
Summary
The detection rule "Windows Rundll32 Load DLL in Temp Dir" identifies instances where the legitimate Windows utility `rundll32.exe` loads a Dynamic Link Library (DLL) from temporary directories, specifically locations like `C:\Users\<User>\AppData\Local\Temp\` or `C:\Windows\Temp\`. This behavior is particularly suspicious, as it is commonly leveraged by malicious software and exploitation tools for evasion tactics, initial access, or privilege escalation. The rule targets cases where the DLL loaded is unsigned, newly written, or executed shortly post-download, which deviates from typical user operations where DLLs are loaded from standard, safe locations. The monitoring of such patterns is crucial for identifying threats that attempt to disguise themselves by masquerading within native system processes while circumventing conventional application security measures. The detection utilizes Sysmon EventID 1 data to track process activities related to `rundll32.exe` in conjunction with specific search criteria aimed at identifying unusual paths for DLL loading.json
Categories
- Endpoint
- Windows
Data Sources
- Process
ATT&CK Techniques
- T1218.011
Created: 2025-07-29