Detect Rundll32 Application Control Bypass - Setupapi
The following analytic identifies rundll32.exe loading setupapi.dll and iesetupapi.dll by calling the LaunchINFSection function on the command line. This particular technique will load script code from a file. Upon a successful execution, the following module loads may occur - clr.dll, jscript.dll and scrobj.dll. During investigation, identify script content origination. Generally, a child process will spawn from rundll32.exe, but that may be bypassed based on script code contents. Rundll32.exe is natively found in C:\Windows\system32 and C:\Windows\syswow64. During investigation, review any network connections and obtain the script content executed. It's possible other files are on disk.
Detect Rundll32 Application Control Bypass - Setupapi Help
To successfully implement this search you need to be ingesting information on process that include the name of the process responsible for the changes from your endpoints into the
Open in Search