| Title | PowerShell Rundll32 Remote Thread Creation | |:---------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------| | Description | Detects PowerShell remote thread creation in Rundll32.exe | | ATT&CK Tactic | | | ATT&CK Technique | | | Data Needed | | | Trigger | | | Severity Level | high | | False Positives | | | Development Status | experimental | | References | | | Author | Florian Roth | ## Detection Rules ### Sigma rule ``` title: PowerShell Rundll32 Remote Thread Creation status: experimental description: Detects PowerShell remote thread creation in Rundll32.exe author: Florian Roth references: - https://www.fireeye.com/blog/threat-research/2018/06/bring-your-own-land-novel-red-teaming-technique.html date: 2018/06/25 logsource: product: windows service: sysmon detection: selection: EventID: 8 SourceImage: '*\powershell.exe' TargetImage: '*\rundll32.exe' condition: selection tags: - attack.defense_evasion - attack.execution - attack.t1085 - attack.t1086 falsepositives: - Unkown level: high ``` ### es-qs ``` ``` ### xpack-watcher ``` ``` ### graylog ``` (EventID:"8" AND SourceImage:"*\\\\powershell.exe" AND TargetImage:"*\\\\rundll32.exe") ``` ### splunk ``` ``` ### logpoint ``` ``` ### grep ``` grep -P '^(?:.*(?=.*8)(?=.*.*\\powershell\\.exe)(?=.*.*\\rundll32\\.exe))' ```