Skip to content
Threat Feed
high advisory

Control Panel Process with Unusual Arguments

Adversaries may abuse control.exe to proxy execution of malicious code by using the Control Panel process to execute payloads from unusual locations, detected by identifying suspicious keywords or paths in the process command line.

This detection rule identifies unusual instances of Control Panel being executed with suspicious keywords or paths in the process command line. Control Panel (control.exe) is a legitimate Windows utility, but adversaries may abuse it to proxy execution of malicious code, effectively bypassing defense mechanisms. This technique involves launching control.exe with command-line arguments that point to malicious payloads or unusual file types, such as image files or INF files, or paths containing traversal sequences. The rule is designed to trigger when control.exe is launched with suspicious arguments like image files, INF files, paths containing traversal sequences, or paths in user-writable locations.

Attack Chain

  1. An adversary gains initial access to the system (e.g., via phishing or exploiting a vulnerability).
  2. The adversary stages a malicious payload on the system in a location such as AppData\Local or Users\Public.
  3. The adversary crafts a command line that uses control.exe to execute the malicious payload. The command line includes a suspicious path, such as control.exe evil.jpg or control.exe ..\..\..\evil.dll.
  4. The control.exe process is executed with the malicious command line.
  5. Control.exe attempts to load the specified file.
  6. If the file is an executable or script, it is executed within the context of the control.exe process.
  7. The malicious code performs its intended actions (e.g., downloading additional payloads, establishing persistence, or exfiltrating data).
  8. The adversary achieves their objective, such as data theft or system compromise.

Impact

Successful exploitation can lead to arbitrary code execution, allowing adversaries to install malware, steal sensitive data, or compromise the entire system. This can result in significant financial loss, reputational damage, and disruption of business operations. Because Control Panel is a signed Microsoft binary, abusing it can bypass application control policies.

Recommendation

  • Deploy the Sigma rule “Control Panel Process with Unusual Arguments” to your SIEM to detect suspicious control.exe command lines (rule).
  • Enable Sysmon process creation logging to capture the command-line arguments of control.exe (logsource).
  • Monitor process execution events for instances of control.exe launching child processes (rule).
  • Investigate any alerts generated by the Sigma rule, focusing on the parent process, command-line arguments, and any subsequent network connections (rule).
  • Implement application control policies to restrict the execution of control.exe from unusual locations (overview).

Detection coverage 2

Control Panel with Suspicious Arguments

high

Detects Control Panel process (control.exe) being executed with suspicious arguments, indicating potential abuse for proxy execution.

sigma tactics: defense_evasion techniques: T1218.011 sources: process_creation, windows

Control Panel Executes Image File

medium

Detects instances where Control Panel (control.exe) is used to execute image files, which is an unusual behavior often associated with malicious activity.

sigma tactics: defense_evasion techniques: T1218.011 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →