Suspicious Rundll32 Invoking Inline VBScript

Detects suspicious process related to rundll32 based on command line that invokes inline VBScript as seen being used by UNC2452

Sigma rule (View on GitHub)

 1title: Suspicious Rundll32 Invoking Inline VBScript
 2id: 1cc50f3f-1fc8-4acf-b2e9-6f172e1fdebd
 3status: test
 4description: Detects suspicious process related to rundll32 based on command line that invokes inline VBScript as seen being used by UNC2452
 5references:
 6    - https://www.microsoft.com/security/blog/2021/03/04/goldmax-goldfinder-sibot-analyzing-nobelium-malware/
 7author: Florian Roth (Nextron Systems)
 8date: 2021-03-05
 9modified: 2022-10-09
10tags:
11    - attack.privilege-escalation
12    - attack.defense-evasion
13    - attack.t1055
14logsource:
15    category: process_creation
16    product: windows
17detection:
18    selection:
19        CommandLine|contains|all:
20            - 'rundll32.exe'
21            - 'Execute'
22            - 'RegRead'
23            - 'window.close'
24    condition: selection
25falsepositives:
26    - Unknown
27level: high

References

Related rules

to-top