<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Rundll32 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/rundll32/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/rundll32/feed.xml" rel="self" type="application/rss+xml"/><item><title>Command Shell Activity Started via RunDLL32</title><link>https://feed.craftedsignal.io/briefs/2026-05-rundll32-cmd-shell/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-rundll32-cmd-shell/</guid><description>This rule detects command shell activity, such as cmd.exe or powershell.exe, initiated by RunDLL32, a technique commonly abused by attackers to execute malicious code and bypass security controls.</description><content:encoded><![CDATA[<p>Attackers commonly abuse RunDLL32, a legitimate Windows utility, to execute malicious code by hosting it within DLLs. This technique allows adversaries to launch command shells like cmd.exe or PowerShell, effectively bypassing traditional security controls. Defenders should be aware of this technique because it provides a stealthy way for attackers to execute arbitrary commands, potentially leading to further compromise of the system. This activity is detected by monitoring for command shells initiated by RunDLL32, while excluding known benign patterns to reduce false positives. The detection rule was last updated on 2026/05/04 and supports multiple data sources, including Elastic Defend, Microsoft Defender XDR, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through an exploit or social engineering.</li>
<li>The attacker uses RunDLL32.exe to execute a malicious DLL.</li>
<li>RunDLL32.exe loads the specified DLL into memory.</li>
<li>The malicious DLL contains code to execute a command shell (cmd.exe or powershell.exe).</li>
<li>RunDLL32.exe spawns a command shell process.</li>
<li>The attacker uses the command shell to execute commands for reconnaissance.</li>
<li>The attacker may use the command shell to download additional payloads.</li>
<li>The attacker leverages the command shell to perform lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary commands on the compromised system. While the rule is rated &ldquo;low&rdquo; severity, this initial access can lead to credential access (T1552) and further lateral movement within the network. Attackers can potentially gain full control of the system, leading to data theft, system disruption, or other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Command Shell Activity Started via RunDLL32&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to provide the necessary data for this detection.</li>
<li>Review the process details of RunDLL32.exe to confirm the parent-child relationship with the command shell, helping to reduce false positives.</li>
<li>Implement enhanced monitoring for rundll32.exe and related processes to detect similar activities in the future and improve response times.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>execution</category><category>command-shell</category><category>rundll32</category></item><item><title>Rundll32 Execution with DLL Stored in Alternate Data Stream (ADS)</title><link>https://feed.craftedsignal.io/briefs/2024-01-08-rundll32-ads/</link><pubDate>Mon, 08 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-08-rundll32-ads/</guid><description>Adversaries may use rundll32.exe to execute DLLs stored within alternate data streams (ADS) to bypass security controls and conceal malicious code.</description><content:encoded><![CDATA[<p>Rundll32 is a legitimate Windows utility used to execute DLLs. However, adversaries can abuse this functionality to execute malicious code while evading detection. This technique involves storing a malicious DLL within an Alternate Data Stream (ADS) of a file. ADS allows hiding data within existing files, making it less likely to be discovered by standard file system scans. When rundll32.exe is then used to execute the DLL from the ADS, it can bypass application whitelisting and other security measures, as the execution appears to originate from the trusted rundll32.exe process. This technique has been observed across various threat actors seeking to establish persistence or execute arbitrary code.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through methods like phishing or exploiting a vulnerability.</li>
<li>The attacker uploads a malicious DLL to the target system.</li>
<li>The attacker uses a command-line utility to write the DLL into an Alternate Data Stream (ADS) of an existing file, such as a text file or image. For example: <code>echo &quot;DLL content&quot; &gt; legitimate_file.txt:malicious.dll</code>.</li>
<li>The attacker uses <code>rundll32.exe</code> to execute the DLL stored in the ADS. The command typically looks like: <code>rundll32.exe &quot;C:\ads\file.txt:ADSDLL.dll&quot;,DllMain</code>.</li>
<li>Rundll32.exe loads and executes the malicious DLL from the ADS.</li>
<li>The malicious DLL performs its intended actions, such as establishing persistence, downloading additional payloads, or exfiltrating data.</li>
<li>The attacker may use additional techniques to further conceal their activity, such as obfuscating the command line or using process injection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows arbitrary code execution on the targeted system. Attackers can use this technique to establish persistence, escalate privileges, bypass security controls, and deploy further malware. The use of ADS makes detection more challenging, as the malicious DLL is hidden within a seemingly benign file. This can lead to data breaches, system compromise, and potential financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture the command-line arguments used with <code>rundll32.exe</code> (as used in the Sigma rules below).</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect suspicious <code>rundll32.exe</code> executions from ADS.</li>
<li>Monitor for unusual file modifications that involve writing data to alternate data streams.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized executables.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>ads</category><category>rundll32</category><category>windows</category></item><item><title>Unusual Child Processes of RunDLL32 Execution Without Arguments</title><link>https://feed.craftedsignal.io/briefs/2024-01-rundll32-no-args/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rundll32-no-args/</guid><description>The execution of `rundll32.exe` without arguments, followed by a child process execution, indicates potential abuse of Rundll32 for proxy execution or payload handoff, often employed for defense evasion on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies instances where <code>rundll32.exe</code> is executed without arguments or with malformed arguments, immediately followed by the execution of a child process. This behavior is atypical, as <code>rundll32.exe</code> is normally invoked with specific parameters indicating a DLL, export, or Control_RunDLL target. Attackers may exploit this by using <code>rundll32.exe</code> as a proxy to execute other malicious payloads or for command and control. The detection logic focuses on identifying instances where the argument count is one and the command line does not conform to expected patterns. This behavior has been observed being used by malware to evade traditional detection methods by proxying execution through a trusted Windows utility. This rule is applicable to endpoint telemetry, Windows event logs, and Crowdstrike FDR data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An initial access vector, such as a phishing email or exploit, delivers an initial payload to the system.</li>
<li>The initial payload executes, potentially dropping or creating a file on disk, or directly invoking rundll32.exe.</li>
<li><code>rundll32.exe</code> is executed without arguments, or with malformed arguments, bypassing typical usage patterns. This is the key indicator the rule detects.</li>
<li><code>rundll32.exe</code> spawns a child process, which could be a script interpreter (e.g., <code>powershell.exe</code>, <code>cmd.exe</code>), another executable, or a network utility.</li>
<li>The child process executes malicious code, downloads additional payloads, or establishes a command and control connection.</li>
<li>The attacker leverages the child process for lateral movement or privilege escalation within the network.</li>
<li>The final objective could include data exfiltration, ransomware deployment, or persistent access to the compromised system.</li>
<li>The adversary uses <code>rundll32.exe</code> to hide the execution of the malicious process and blend into normal system activity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to gain control of the affected system. This can result in data breaches, system compromise, and potential lateral movement within the network. The use of a trusted system binary like <code>rundll32.exe</code> makes detection more challenging. It affects Windows systems and can be used in targeted attacks as well as widespread campaigns. Organizations failing to detect this behavior are at risk of significant data loss and operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Unusual RunDLL32 Child Process</code> to your SIEM and tune for your environment to detect the execution of <code>rundll32.exe</code> without arguments, followed by a child process.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to collect the necessary data for the Sigma rule.</li>
<li>Investigate any alerts generated by this rule to determine the legitimacy of the <code>rundll32.exe</code> execution and the spawned child process.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted executables in your environment, mitigating the impact of this technique.</li>
<li>Monitor process execution events for unusual parent-child relationships involving <code>rundll32.exe</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>rundll32</category></item></channel></rss>