Closed claire-st closed 2 weeks ago
{"B (Baseline)"=>"Focused on identifying deviations from typical behavior."}
@claire-st
Adversaries are exploiting the native Windows process Rundll32 in order to execute malicious code and bypass application control solutions
Execution, Defense Evasion
Examples of what to look for:
Approved.
Hunt Type
{"B (Baseline)"=>"Focused on identifying deviations from typical behavior."}
Submitter
@claire-st
Hypothesis / Hunt Idea
Adversaries are exploiting the native Windows process Rundll32 in order to execute malicious code and bypass application control solutions
Tactic
Execution, Defense Evasion
Notes
Tags
Execution #Defense Evasion #LOLBIN #Rundll32
Explain the importance of this hypothesis and its potential consequences.
Outline the next steps required to develop or investigate this hypothesis.
Examples of what to look for:
References