SigmaHQ/rules/windows/process_creation/win_susp_control_dll_load.yml
2021-04-03 00:08:55 +02:00

30 lines
814 B
YAML

title: Suspicious Control Panel DLL Load
id: d7eb979b-c2b5-4a6f-a3a7-c87ce6763819
status: experimental
description: Detects suspicious Rundll32 execution from control.exe as used by Equation Group and Exploit Kits
author: Florian Roth
date: 2017/04/15
modified: 2020/09/05
references:
- https://twitter.com/rikvduijn/status/853251879320662017
tags:
- attack.defense_evasion
- attack.t1085 # an old one
- attack.t1218.011
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith: '\System32\control.exe'
Image|endswith: '\rundll32.exe '
filter:
CommandLine|contains: 'Shell32.dll'
condition: selection and not filter
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Unknown
level: high