Suspicious ShellExec_RunDLL Call Via Ordinal
Detects suspicious call to the "ShellExec_RunDLL" exported function of SHELL32.DLL through the ordinal number to launch other commands. Adversary might only use the ordinal number in order to bypass existing detection that alert on usage of ShellExec_RunDLL on CommandLine.
Sigma rule (View on GitHub)
1title: Suspicious ShellExec_RunDLL Call Via Ordinal
2id: 8823e85d-31d8-473e-b7f4-92da070f0fc6
3related:
4 - id: d87bd452-6da1-456e-8155-7dc988157b7d
5 type: derived
6status: experimental
7description: |
8 Detects suspicious call to the "ShellExec_RunDLL" exported function of SHELL32.DLL through the ordinal number to launch other commands.
9 Adversary might only use the ordinal number in order to bypass existing detection that alert on usage of ShellExec_RunDLL on CommandLine.
10references:
11 - https://redcanary.com/blog/raspberry-robin/
12 - https://www.microsoft.com/en-us/security/blog/2022/10/27/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity/
13 - https://github.com/SigmaHQ/sigma/issues/1009
14 - https://strontic.github.io/xcyclopedia/library/shell32.dll-65DA072F25DE83D9F83653E3FEA3644D.html
15author: Swachchhanda Shrawan Poudel
16date: 2024-12-01
17tags:
18 - attack.defense-evasion
19 - attack.t1218.011
20logsource:
21 category: process_creation
22 product: windows
23detection:
24 selection_parent_img:
25 ParentCommandLine|contains: 'SHELL32.DLL'
26 selection_parent_ordinal:
27 ParentCommandLine|contains:
28 # Note: The ordinal number may differ depending on the DLL version
29 # Example: rundll32 SHELL32.DLL,#572 "cmd.exe" "/c calc.exe"
30 - '#568'
31 - '#570'
32 - '#572'
33 - '#576'
34 selection_susp_cli_parent:
35 # Note: Add additional binaries and suspicious paths to increase coverage
36 - ParentCommandLine|contains:
37 - 'comspec'
38 - 'iex'
39 - 'Invoke-'
40 - 'msiexec'
41 - 'odbcconf'
42 - 'regsvr32'
43 - ParentCommandLine|contains:
44 - '\Desktop\'
45 - '\ProgramData\'
46 - '\Temp\'
47 - '\Users\Public\'
48 selection_susp_child_img:
49 Image|endswith:
50 - '\bash.exe'
51 - '\bitsadmin.exe'
52 - '\cmd.exe'
53 - '\cscript.exe'
54 - '\curl.exe'
55 - '\mshta.exe'
56 - '\msiexec.exe'
57 - '\msxsl.exe'
58 - '\odbcconf.exe'
59 - '\powershell.exe'
60 - '\pwsh.exe'
61 - '\regsvr32.exe'
62 - '\schtasks.exe'
63 - '\wmic.exe'
64 - '\wscript.exe'
65 condition: all of selection_parent_* and 1 of selection_susp_*
66falsepositives:
67 - Unknown
68level: high
References
Related rules
- Remote Thread Creation Via PowerShell In Uncommon Target
- Bad Opsec Defaults Sacrificial Processes With Improper Arguments
- APT29 2018 Phishing Campaign CommandLine Indicators
- APT29 2018 Phishing Campaign File Indicators
- CobaltStrike Load by Rundll32