Files
blue-team-tools/rules/windows/process_creation/win_susp_control_dll_load.yml
T

30 lines
777 B
YAML
Raw Normal View History

title: Suspicious Control Panel DLL Load
2019-11-12 23:12:27 +01:00
id: d7eb979b-c2b5-4a6f-a3a7-c87ce6763819
status: experimental
description: Detects suspicious Rundll32 execution from control.exe as used by Equation Group and Exploit Kits
author: Florian Roth
date: 2017/04/15
references:
2019-03-02 00:14:20 +01:00
- https://twitter.com/rikvduijn/status/853251879320662017
tags:
- attack.defense_evasion
- attack.t1073
- attack.t1085
2019-06-13 23:15:38 -05:00
- car.2013-10-002
logsource:
2019-03-02 00:14:20 +01:00
category: process_creation
product: windows
detection:
2019-03-02 00:14:20 +01:00
selection:
ParentImage: '*\System32\control.exe'
CommandLine: '*\rundll32.exe *'
filter:
CommandLine: '*Shell32.dll*'
condition: selection and not filter
fields:
2019-03-02 00:14:20 +01:00
- CommandLine
- ParentCommandLine
falsepositives:
2019-03-02 00:14:20 +01:00
- Unknown
level: high