SigmaHQ/rules/windows/process_creation/win_susp_pcwutl.yml

28 lines
880 B
YAML
Raw Normal View History

2020-10-06 05:55:01 +00:00
title: Code Execution via Pcwutl.dll
2020-10-05 08:30:24 +00:00
id: 9386d78a-7207-4048-9c9f-a93a7c2d1c05
2020-10-06 05:55:01 +00:00
description: Detects launch of executable by calling the LaunchApplication function from pcwutl.dll library.
2020-10-05 08:30:24 +00:00
status: experimental
references:
- https://github.com/api0cradle/LOLBAS/blob/master/OSLibraries/Pcwutl.md
- https://twitter.com/harr0ey/status/989617817849876488
2020-10-06 05:55:01 +00:00
author: Julia Fomina, oscd.community
date: 2020/10/05
2020-10-05 08:30:24 +00:00
tags:
- attack.defense_evasion
- attack.t1218.011
- attack.execution # an old one
- attack.t1218 # an old one
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\rundll32.exe'
CommandLine|contains|all:
- 'pcwutl'
- 'LaunchApplication'
2020-10-05 08:30:24 +00:00
condition: selection
level: medium
falsepositives:
- Use of Program Compatibility Troubleshooter Helper