Potential ShellDispatch.DLL Functionality Abuse
Detects potential "ShellDispatch.dll" functionality abuse to execute arbitrary binaries via "ShellExecute"
Sigma rule (View on GitHub)
1title: Potential ShellDispatch.DLL Functionality Abuse
2id: 82343930-652f-43f5-ab70-2ee9fdd6d5e9
3status: test
4description: Detects potential "ShellDispatch.dll" functionality abuse to execute arbitrary binaries via "ShellExecute"
5references:
6 - https://www.hexacorn.com/blog/2023/06/07/this-lolbin-doesnt-exist/
7author: X__Junior (Nextron Systems)
8date: 2023-06-20
9tags:
10 - attack.execution
11 - attack.defense-evasion
12logsource:
13 category: process_creation
14 product: windows
15detection:
16 selection_img:
17 - Image|endswith: '\rundll32.exe'
18 - OriginalFileName: 'RUNDLL32.EXE'
19 selection_cli:
20 CommandLine|contains: 'RunDll_ShellExecuteW'
21 condition: all of selection_*
22falsepositives:
23 - Unlikely
24level: medium
References
Related rules
- AMSI Bypass Pattern Assembly GetType
- APT29 2018 Phishing Campaign CommandLine Indicators
- Add Insecure Download Source To Winget
- Add New Download Source To Winget
- Arbitrary File Download Via MSOHTMED.EXE