Suspicious Rundll32 Invoking Inline VBScript
Detects suspicious process related to rundll32 based on command line that invokes inline VBScript as seen being used by UNC2452
Sigma rule (View on GitHub)
1title: Suspicious Rundll32 Invoking Inline VBScript
2id: 1cc50f3f-1fc8-4acf-b2e9-6f172e1fdebd
3status: test
4description: Detects suspicious process related to rundll32 based on command line that invokes inline VBScript as seen being used by UNC2452
5references:
6 - https://www.microsoft.com/security/blog/2021/03/04/goldmax-goldfinder-sibot-analyzing-nobelium-malware/
7author: Florian Roth (Nextron Systems)
8date: 2021-03-05
9modified: 2022-10-09
10tags:
11 - attack.defense-evasion
12 - attack.t1055
13logsource:
14 category: process_creation
15 product: windows
16detection:
17 selection:
18 CommandLine|contains|all:
19 - 'rundll32.exe'
20 - 'Execute'
21 - 'RegRead'
22 - 'window.close'
23 condition: selection
24falsepositives:
25 - Unknown
26level: high
References
Related rules
- APT PRIVATELOG Image Load Pattern
- CobaltStrike Named Pipe
- CobaltStrike Named Pipe Pattern Regex
- CobaltStrike Named Pipe Patterns
- Created Files by Microsoft Sync Center