heroui logo

Detect Rundll32 Application Control Bypass - syssetup

Splunk Security Content

View Source
Summary
This detection rule targets the execution of 'rundll32.exe' that loads 'syssetup.dll' through the 'LaunchINFSection' function, utilizing telemetry from Endpoint Detection and Response (EDR) systems. This behavior is crucial as it can indicate a bypass of application controls, allowing potential malicious script execution from files. If maliciously exploited, it could lead to actions such as privilege escalation, persistence, or further network attacks. The rule analyzes command-line executions and pertinent process details using data sources like Sysmon and Windows Event Logs. Review any associated script content, network activity, and child processes spawned during this execution for thorough investigation.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1218
  • T1218.011
Created: 2024-12-10