Rule Library

Sigma Rules

43 rules found for "attack.T1218.011"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Remote Thread Creation Via PowerShell In Uncommon Target

Detects the creation of a remote thread from a Powershell process in an uncommon target process

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32T1059.001 · PowerShell
Florian Roth (Nextron Systems)Mon Jun 25windows
Detectionmediumtest

SCR File Write Event

Detects the creation of screensaver files (.scr) outside of system folders. Attackers may execute an application as an ".SCR" file using "rundll32.exe desk.cpl,InstallScreenSaver" for example.

WindowsFile Event
TA0005 · Defense EvasionT1218.011 · Rundll32
Christopher Peacock+1Wed Apr 27windows
Detectionmediumtest

Unsigned DLL Loaded by Windows Utility

Detects windows utilities loading an unsigned or untrusted DLL. Adversaries often abuse those programs to proxy execution of malicious code.

WindowsImage Load (DLL)
T1218.011 · Rundll32T1218.010 · Regsvr32TA0005 · Defense Evasion
Swachchhanda Shrawan PoudelWed Feb 28windows
Detectionmediumtest

Rundll32 Internet Connection

Detects a rundll32 that communicates with public IP addresses

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.011 · Rundll32TA0002 · Execution
Florian Roth (Nextron Systems)Sat Nov 04windows
Detectionmediumtest

Outbound Network Connection To Public IP Via Winlogon

Detects a "winlogon.exe" process that initiate network communications with public IP addresses

WindowsNetwork Connection
TA0005 · Defense EvasionTA0002 · ExecutionTA0011 · Command and ControlT1218.011 · Rundll32
Christopher Peacock+1Fri Apr 28windows
Detectionhightest

Process Access via TrolleyExpress Exclusion

Detects a possible process memory dump that uses the white-listed Citrix TrolleyExpress.exe filename as a way to dump the lsass process memory

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Thu Feb 10windows
Detectionhightest

HTML Help HH.EXE Suspicious Child Process

Detects a suspicious child process of a Microsoft HTML Help (HH.exe)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0001 · Initial AccessT1047 · Windows Management Instrumentation+10
Maxim Pavlunin+1Wed Apr 01windows
Detectionhightest

Suspicious HH.EXE Execution

Detects a suspicious execution of a Microsoft HTML Help (HH.exe)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0001 · Initial AccessT1047 · Windows Management Instrumentation+10
Maxim PavluninWed Apr 01windows
Detectioncriticaltest

HackTool - F-Secure C3 Load by Rundll32

F-Secure C3 produces DLLs with a default exported StartNodeRelay function.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Alfie Champion (ajpc500)Wed Jun 02windows
Detectionhightest

CobaltStrike Load by Rundll32

Rundll32 can be use by Cobalt Strike with StartW function to load DLLs from the command line.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Wojciech LesickiTue Jun 01windows
Detectionhightest

HackTool - RedMimicry Winnti Playbook Execution

Detects actions caused by the RedMimicry Winnti playbook a automated breach emulations utility

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1106 · Native APIT1059.003 · Windows Command Shell+1
Alexander RauschWed Jun 24windows
Detectionmediumtest

Code Execution via Pcwutl.dll

Detects launch of executable by calling the LaunchApplication function from pcwutl.dll library.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Julia Fomina+1Mon Oct 05windows
Detectionmediumtest

Rundll32 InstallScreenSaver Execution

An attacker may execute an application as a SCR File using rundll32.exe desk.cpl,InstallScreenSaver

WindowsProcess Creation
T1218.011 · Rundll32TA0005 · Defense Evasion
Christopher Peacock+2Thu Apr 28windows
Detectionmediumtest

Suspicious Rundll32 Setupapi.dll Activity

setupapi.dll library provide InstallHinfSection function for processing INF files. INF file may contain instructions allowing to create values in the registry, modify files and install drivers. This technique could be used to obtain persistence via modifying one of Run or RunOnce registry keys, run process or use other DLLs chain calls (see references) InstallHinfSection function in setupapi.dll calls runonce.exe executable regardless of actual content of INF file.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Konstantin Grishchenko+1Wed Oct 07windows
Detectionhightest

Shell32 DLL Execution in Suspicious Directory

Detects shell32.dll executing a DLL in a suspicious directory

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32
Christian Burkard (Nextron Systems)Wed Nov 24windows
Detectionhightest

RunDLL32 Spawning Explorer

Detects RunDLL32.exe spawning explorer.exe as child, which is very uncommon, often observes Gamarue spawning the explorer.exe process in an unusual way

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
elhoim+1Wed Apr 27windows
Detectionmediumtest

Potentially Suspicious Rundll32 Activity

Detects suspicious execution of rundll32, with specific calls to some DLLs with known LOLBIN functionalities

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
juju4+3Wed Jan 16windows
Detectionhightest

Suspicious Control Panel DLL Load

Detects suspicious Rundll32 execution from control.exe as used by Equation Group and Exploit Kits

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Florian Roth (Nextron Systems)Sat Apr 15windows
Detectionhightest

Suspicious Rundll32 Execution With Image Extension

Detects the execution of Rundll32.exe with DLL files masquerading as image files

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Hieu TranMon Mar 13windows
Detectionhightest

Suspicious ShellExec_RunDLL Call Via Ordinal

Detects suspicious call to the "ShellExec_RunDLL" exported function of SHELL32.DLL through the ordinal number to launch other commands. Adversary might only use the ordinal number in order to bypass existing detection that alert on usage of ShellExec_RunDLL on CommandLine.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Swachchhanda Shrawan PoudelSun Dec 01windows
Detectionhightest

Suspicious Rundll32 Activity Invoking Sys File

Detects suspicious process related to rundll32 based on command line that includes a *.sys file as seen being used by UNC2452

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Florian Roth (Nextron Systems)Fri Mar 05windows
Detectionmediumtest

Potentially Suspicious Rundll32.EXE Execution of UDL File

Detects the execution of rundll32.exe with the oledb32.dll library to open a UDL file. Threat actors can abuse this technique as a phishing vector to capture authentication credentials or other sensitive data.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0011 · Command and ControlT1218.011 · Rundll32+1
kostastsaleFri Aug 16windows
Detectionmediumtest

Rundll32 Execution With Uncommon DLL Extension

Detects the execution of rundll32 with a command line that doesn't contain a common extension

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Tim Shelton+2Thu Jan 13windows
Detectionhightest

Rundll32 UNC Path Execution

Detects rundll32 execution where the DLL is located on a remote location (share)

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares+1
Nasreddine Bencherchali (Nextron Systems)Wed Aug 10windows
Detectionhightest

Bad Opsec Defaults Sacrificial Processes With Improper Arguments

Detects attackers using tooling with bad opsec defaults. E.g. spawning a sacrificial process to inject a capability into the process without taking into account how the process is normally run. One trivial example of this is using rundll32.exe without arguments as a sacrificial process (default in CS, now highlighted by c2lint), running WerFault without arguments (Kraken - credit am0nsec), and other examples.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Oleg Kolesnikov invrep_de+3Fri Oct 23windows
Detectionhightest

Potential PowerShell Execution Via DLL

Detects potential PowerShell execution from a DLL instead of the usual PowerShell process as seen used in PowerShdll. This detection assumes that PowerShell commands are passed via the CommandLine.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
Markus Neis+1Sat Aug 25windows
Detectionmediumtest

ScreenSaver Registry Key Set

Detects registry key established after masqueraded .scr file execution using Rundll32 through desk.cpl

WindowsRegistry Set
TA0005 · Defense EvasionT1218.011 · Rundll32
Jose Luis Sanchez MartinezWed May 04windows
Emerging Threatcriticaltest

ZxShell Malware

Detects a ZxShell start by the called and well-known function name

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command ShellTA0005 · Defense EvasionT1218.011 · Rundll32+3
Florian Roth (Nextron Systems)+2Thu Jul 202014
Emerging Threathightest

Fireball Archer Install

Detects Archer malware invocation via rundll32

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
Florian Roth (Nextron Systems)Sat Jun 032017
Emerging Threatcriticaltest

NotPetya Ransomware Activity

Detects NotPetya ransomware activity in which the extracted passwords are passed back to the main module via named pipe, the file system journal of drive C is deleted and Windows eventlogs are cleared using wevtutil

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32T1070.001 · Clear Windows Event LogsTA0006 · Credential Access+3
Florian Roth (Nextron Systems)+1Wed Jan 162017
Emerging Threathightest

Sofacy Trojan Loader Activity

Detects Trojan loader activity as used by APT28

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionG0007 · APT28T1059.003 · Windows Command Shell+3
Florian Roth (Nextron Systems)+2Thu Mar 012018
Emerging Threatcriticalstable

APT29 2018 Phishing Campaign File Indicators

Detects indicators of APT 29 (Cozy Bear) phishing-campaign as reported by mandiant

WindowsFile Event
TA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
@41thexplorerTue Nov 202018
Emerging Threatcriticalstable

APT29 2018 Phishing Campaign CommandLine Indicators

Detects indicators of APT 29 (Cozy Bear) phishing-campaign as reported by mandiant

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32detection.emerging-threats
Florian Roth (Nextron Systems)Tue Nov 202018
Emerging Threatcriticalstable

Equation Group DLL_U Export Function Load

Detects a specific export function name used by one of EquationGroup tools

WindowsProcess Creation
G0020 · G0020TA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
Florian Roth (Nextron Systems)Mon Mar 042019
Emerging Threatcriticaltest

Potential Emotet Rundll32 Execution

Detecting Emotet DLL loading by looking for rundll32.exe processes with command lines ending in ,RunDLL or ,Control_RunDLL

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
FPT.EagleEyeFri Dec 252020
Emerging Threatcriticaltest

EvilNum APT Golden Chickens Deployment Via OCX Files

Detects Golden Chickens deployment method as used by Evilnum and described in ESET July 2020 report

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
Florian Roth (Nextron Systems)Fri Jul 102020
Emerging Threathightest

Potential Bumblebee Remote Thread Creation

Detects remote thread injection events based on action seen used by bumblebee

WindowsRemote Thread Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32T1059.001 · PowerShell+1
Nasreddine Bencherchali (Nextron Systems)Tue Sep 272022
Emerging Threathightest

IcedID Malware Suspicious Single Digit DLL Execution Via Rundll32

Detects RunDLL32.exe executing a single digit DLL named "1.dll" with the export function "DllRegisterServer". This behaviour was often seen used by malware and especially IcedID

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Thu Aug 312023
Emerging Threatmediumtest

Rhadamanthys Stealer Module Launch Via Rundll32.EXE

Detects the use of Rundll32 to launch an NSIS module that serves as the main stealer capability of Rhadamanthys infostealer, as observed in reports and samples in early 2023

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
TropChaudThu Jan 262023
Emerging Threathightest

Kapeka Backdoor Loaded Via Rundll32.EXE

Detects the Kapeka Backdoor binary being loaded by rundll32.exe. The Kapeka loader drops a backdoor, which is a DLL with the '.wll' extension masquerading as a Microsoft Word Add-In.

WindowsImage Load (DLL)
TA0002 · ExecutionT1204.002 · Malicious FileTA0005 · Defense EvasionT1218.011 · Rundll32+1
Swachchhanda Shrawan PoudelWed Jul 032024
Emerging Threathightest

Kapeka Backdoor Execution Via RunDLL32.EXE

Detects Kapeka backdoor process execution pattern, where the dropper launch the backdoor binary by calling rundll32 and passing the backdoor's first export ordinal (#1) with a "-d" argument.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.emerging-threats
Swachchhanda Shrawan Poudel+1Wed Jul 032024
Emerging Threathightest

Potential Raspberry Robin CPL Execution Activity

Detects the execution of a ".CPL" file located in the user temp directory via the Shell32 DLL "Control_RunDLL" export function. This behavior was observed in multiple Raspberry-Robin variants.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218.011 · Rundll32detection.emerging-threats
Swachchhanda Shrawan PoudelThu Mar 072024
Threat Huntmediumstable

DLL Call by Ordinal Via Rundll32.EXE

Detects calls of DLLs exports by ordinal numbers via rundll32.dll.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32detection.threat-hunting
Florian Roth (Nextron Systems)Tue Oct 22windows