Shell32 DLL Execution in Suspicious Directory
Detects shell32.dll executing a DLL in a suspicious directory
Sigma rule (View on GitHub)
1title: Shell32 DLL Execution in Suspicious Directory
2id: 32b96012-7892-429e-b26c-ac2bf46066ff
3status: test
4description: Detects shell32.dll executing a DLL in a suspicious directory
5references:
6 - https://www.group-ib.com/resources/threat-research/red-curl-2.html
7author: Christian Burkard (Nextron Systems)
8date: 2021-11-24
9modified: 2023-02-09
10tags:
11 - attack.defense-evasion
12 - attack.execution
13 - attack.t1218.011
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection_img:
19 - Image|endswith: '\rundll32.exe'
20 - OriginalFileName: 'RUNDLL32.EXE'
21 selection_cli:
22 CommandLine|contains|all:
23 - 'shell32.dll'
24 - 'Control_RunDLL'
25 CommandLine|contains:
26 - '%AppData%'
27 - '%LocalAppData%'
28 - '%Temp%'
29 - '%tmp%'
30 - '\AppData\'
31 - '\Temp\'
32 - '\Users\Public\'
33 condition: all of selection_*
34falsepositives:
35 - Unknown
36level: high
References
Related rules
- APT29 2018 Phishing Campaign CommandLine Indicators
- Fireball Archer Install
- HTML Help HH.EXE Suspicious Child Process
- HackTool - RedMimicry Winnti Playbook Execution
- Kapeka Backdoor Loaded Via Rundll32.EXE