triw0lf / HEARTH

A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters to share knowledge, collaborate on techniques, and advance the field of threat hunting.
https://threathuntingcommunity.com/
145 stars 11 forks source link

[H/B/M][Unique Hunt Number] #5

Closed claire-st closed 2 weeks ago

claire-st commented 3 weeks ago

Hunt Type

{"B (Baseline)"=>"Focused on identifying deviations from typical behavior."}

Submitter

@claire-st

Hypothesis / Hunt Idea

Adversaries are exploiting the native Windows process Rundll32 in order to execute malicious code and bypass application control solutions

Tactic

Execution, Defense Evasion

Notes

Tags

Execution #Defense Evasion #LOLBIN #Rundll32

Explain the importance of this hypothesis and its potential consequences.

Outline the next steps required to develop or investigate this hypothesis.

Examples of what to look for:

References

letswastetimee commented 2 weeks ago

Approved.