heroui logo

Suspicious Rundll32 Rename

Splunk Security Content

View Source
Summary
This hunting analytic rule focuses on detecting suspicious activities related to renamed instances of "rundll32.exe", a legitimate Windows utility commonly exploited by malicious actors. This utility is usually located in the system directories 'C:\Windows\system32' and 'C:\Windows\syswow64'. Attackers might rename the executable to blend in with legitimate processes while loading malicious scripts. The detection mechanism involves querying Sysmon EventID 1 data where the original file name is "RUNDLL32.exe", yet the process name deviates from its expected form (i.e., not "rundll32.exe"). This inconsistency indicates a potential masquerading instance. The query also filters results based on specific command line arguments integrated in other analytics. It's essential for analysts to verify the legitimacy of the executing "rundll32.exe" instance along with its associated script content during the investigation.
Categories
  • Endpoint
Data Sources
  • Logon Session
  • Process
ATT&CK Techniques
  • T1218
  • T1218.011
  • T1036
  • T1036.003
Created: 2024-11-14