Rules: PowerShell Rundll32 Remote Thread Creation
Detects PowerShell remote thread creation in Rundll32.exe.
Detail | Value |
---|---|
Type | Templated Match |
Category | Defense Evasion |
Apply Risk to Entities | device_hostname, device_ip, user_username |
Signal Name | PowerShell Rundll32 Remote Thread Creation |
Summary Expression | Sysmon observed action: {{action}} performed on host: {{device_hostname}} |
Score/Severity | Static: 4 |
Enabled by Default | True |
Prototype | False |
Tags | _mitreAttackTactic:TA0005, _mitreAttackTactic:TA0008, _mitreAttackTechnique:T1021, _mitreAttackTechnique:T1218, _mitreAttackTechnique:T1218.011, _mitreAttackTechnique:T1021.006, _mitreAttackTechnique:T1059, _mitreAttackTechnique:T1059.001, _mitreAttackTechnique:T1059.003 |
Origin | Field |
---|---|
Normalized Schema | baseImage |
Normalized Schema | device_hostname |
Normalized Schema | device_ip |
Normalized Schema | file_path |
Normalized Schema | metadata_deviceEventId |
Normalized Schema | metadata_product |
Normalized Schema | metadata_vendor |
Normalized Schema | user_username |