mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-08 02:08:54 +00:00
rule: suspicious call by ordinal (rundll32)
This commit is contained in:
parent
0f02f2bdfc
commit
b3654947bc
@ -0,0 +1,23 @@
|
|||||||
|
title: Suspicious Call by Ordinal
|
||||||
|
description: Detects suspicious calls of DLLs in rundll32.dll exports by ordinal
|
||||||
|
status: experimental
|
||||||
|
references:
|
||||||
|
- https://techtalk.pcmatic.com/2017/11/30/running-dll-files-malware-analysis/
|
||||||
|
- https://github.com/Neo23x0/DLLRunner
|
||||||
|
tags:
|
||||||
|
- attack.defense_evasion
|
||||||
|
- attack.execution
|
||||||
|
- attack.t1085
|
||||||
|
author: Florian Roth
|
||||||
|
date: 2019/10/22
|
||||||
|
logsource:
|
||||||
|
category: process_creation
|
||||||
|
product: windows
|
||||||
|
detection:
|
||||||
|
selection:
|
||||||
|
CommandLine: '*\rundll32.exe *,#*'
|
||||||
|
condition: selection
|
||||||
|
falsepositives:
|
||||||
|
- False positives depend on scripts and administrative tools used in the monitored environment
|
||||||
|
- Windows contol panel elements have been identified as source (mmc)
|
||||||
|
level: high
|
Loading…
Reference in New Issue
Block a user