Suspicious Rundll32 Invoking Inline VBScript
Detects suspicious process related to rundll32 based on command line that invokes inline VBScript as seen being used by UNC2452
Sigma rule (View on GitHub)
 1title: Suspicious Rundll32 Invoking Inline VBScript
 2id: 1cc50f3f-1fc8-4acf-b2e9-6f172e1fdebd
 3status: test
 4description: Detects suspicious process related to rundll32 based on command line that invokes inline VBScript as seen being used by UNC2452
 5references:
 6    - https://www.microsoft.com/security/blog/2021/03/04/goldmax-goldfinder-sibot-analyzing-nobelium-malware/
 7author: Florian Roth (Nextron Systems)
 8date: 2021-03-05
 9modified: 2022-10-09
10tags:
11    - attack.privilege-escalation
12    - attack.defense-evasion
13    - attack.t1055
14logsource:
15    category: process_creation
16    product: windows
17detection:
18    selection:
19        CommandLine|contains|all:
20            - 'rundll32.exe'
21            - 'Execute'
22            - 'RegRead'
23            - 'window.close'
24    condition: selection
25falsepositives:
26    - Unknown
27level: high
References
Related rules
- Antivirus PrinterNightmare CVE-2021-34527 Exploit Detection
- Created Files by Microsoft Sync Center
- Dllhost.EXE Execution Anomaly
- DotNet CLR DLL Loaded By Scripting Applications
- HackTool - DInjector PowerShell Cradle Execution