Source: Securityinbits
Author: Ayush Anand
URL: https://www.securityinbits.com/detection-engineering/lsass-dump-comsvcs-rundll32/
LSASS Dump via comsvcs.dll: Defender Detection Guide
ONE SENTENCE SUMMARY:
The query filters device process events for suspicious rundll32.exe activity involving specific command line patterns indicating potential threats.
MAIN POINTS:
- Filters DeviceProcessEvents for suspicious rundll32.exe activity.
- Targets FolderPath ending with “\rundll32.exe”.
- Includes processes with OriginalFileName “RUNDLL32.EXE”.
- Searches for ProcessCommandLine containing “rundll32”.
- Detects command line patterns: “#+”, “#-“, “#0”.
- Includes command patterns “#655” and “#656”.
- Aims to identify potential security threats.
- Uses specific command line criteria for filtering.
- Focuses on unusual rundll32.exe execution.
- Enhances threat detection in device processes.
TAKEAWAYS:
- Rundll32.exe processes with unusual commands may indicate a threat.
- Specific command line patterns are crucial for detection.
- Filtering by executable name helps narrow down suspicious activity.
- Command lines with specific patterns signal potential malicious behavior.
- It’s essential for detecting and mitigating security threats.