Files
blue-team-tools/deprecated/windows/proc_creation_win_rundll32_script_run.yml
T
Josh b7ea91278e Merge PR #4719 from @joshnck - Update Rules Related To RunHTMLApplication Abuse
update: Mshtml.DLL RunHTMLApplication Suspicious Usage - Merge overlapping rules and enhance logic to account for new reported bypass
remove: Rundll32 JS RunHTMLApplication Pattern
remove: Suspicious Rundll32 Script in CommandLine 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-26 11:37:37 +01:00

32 lines
1.0 KiB
YAML

title: Suspicious Rundll32 Script in CommandLine
id: 73fcad2e-ff14-4c38-b11d-4172c8ac86c7
status: deprecated
description: Detects suspicious process related to rundll32 based on arguments
references:
- https://gist.github.com/ryhanson/227229866af52e2d963cf941af135a52
- https://github.com/redcanaryco/atomic-red-team/blob/cd3690b100a495885c407282d0c94c85f48a8a2e/atomics/T1218.011/T1218.011.md
author: frack113, Zaw Min Htun (ZETA)
date: 2021/12/04
modified: 2024/02/23
tags:
- attack.defense_evasion
- attack.t1218.011
logsource:
category: process_creation
product: windows
detection:
selection1:
CommandLine|contains: 'rundll32'
selection2:
CommandLine|contains:
- 'mshtml,RunHTMLApplication'
- 'mshtml,#135'
selection3:
CommandLine|contains:
- 'javascript:'
- 'vbscript:'
condition: all of selection*
falsepositives:
- False positives depend on scripts and administrative tools used in the monitored environment
level: medium