diff --git a/rules/windows/process_creation/win_pc_susp_rundll32_script_run.yml b/rules/windows/process_creation/win_pc_susp_rundll32_script_run.yml new file mode 100644 index 000000000..746676b78 --- /dev/null +++ b/rules/windows/process_creation/win_pc_susp_rundll32_script_run.yml @@ -0,0 +1,28 @@ +title: Suspicious Rundll32 Script in CommandLine +id: 73fcad2e-ff14-4c38-b11d-4172c8ac86c7 +status: experimental +description: Detects suspicious process related to rundll32 based on arguments +author: frack113 +references: + - https://gist.github.com/ryhanson/227229866af52e2d963cf941af135a52 + - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1218.011/T1218.011.md +date: 2021/12/04 +logsource: + category: process_creation + product: windows +detection: + selection_run: + CommandLine|contains|all: + - rundll32 + - 'mshtml,RunHTMLApplication' + selection_script: + CommandLine|contains: + - 'javascript:' + - 'vbscript:' + condition: all of selection_* +falsepositives: + - False positives depend on scripts and administrative tools used in the monitored environment +level: medium +tags: + - attack.defense_evasion + - attack.t1218.011 diff --git a/rules/windows/process_creation/win_susp_rundll32_activity.yml b/rules/windows/process_creation/win_susp_rundll32_activity.yml index f7237274e..8207ef45e 100644 --- a/rules/windows/process_creation/win_susp_rundll32_activity.yml +++ b/rules/windows/process_creation/win_susp_rundll32_activity.yml @@ -8,13 +8,13 @@ references: - https://twitter.com/Hexacorn/status/885258886428725250 - https://gist.github.com/ryhanson/227229866af52e2d963cf941af135a52 date: 2019/01/16 -modified: 2021/11/27 +modified: 2021/12/04 logsource: category: process_creation product: windows detection: selection: - - CommandLine|contains: + - CommandLine|contains|all: - 'javascript:' - '.RegisterXLL' - CommandLine|contains|all: