Suspicious Usage Of ShellExec_RunDLL
Detects suspicious usage of the ShellExec_RunDLL function to launch other commands as seen in the the raspberry-robin attack
Sigma rule (View on GitHub)
1title: Suspicious Usage Of ShellExec_RunDLL
2id: d87bd452-6da1-456e-8155-7dc988157b7d
3related:
4 - id: 36c5146c-d127-4f85-8e21-01bf62355d5a
5 type: obsolete
6status: test
7description: Detects suspicious usage of the ShellExec_RunDLL function to launch other commands as seen in the the raspberry-robin attack
8references:
9 - https://redcanary.com/blog/raspberry-robin/
10 - https://www.microsoft.com/en-us/security/blog/2022/10/27/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity/
11 - https://github.com/SigmaHQ/sigma/issues/1009
12author: Nasreddine Bencherchali (Nextron Systems)
13date: 2022-09-01
14modified: 2022-12-30
15tags:
16 - attack.defense-evasion
17logsource:
18 category: process_creation
19 product: windows
20detection:
21 selection_openasrundll:
22 CommandLine|contains: 'ShellExec_RunDLL'
23 selection_suspcli:
24 CommandLine|contains:
25 # Add more LOLBINs and Susp Paths
26 - 'regsvr32'
27 - 'msiexec'
28 - '\Users\Public\'
29 - 'odbcconf'
30 - '\Desktop\'
31 - '\Temp\'
32 - 'Invoke-'
33 - 'iex'
34 - 'comspec'
35 condition: all of selection_*
36falsepositives:
37 - Unknown
38level: high
References
Related rules
- AD Object WriteDAC Access
- ADS Zone.Identifier Deleted By Uncommon Application
- AMSI Bypass Pattern Assembly GetType
- APT PRIVATELOG Image Load Pattern
- APT27 - Emissary Panda Activity