title: Detection of PowerShell Execution via DLL author: Markus Neis date: 2018/08/25 description: Detects PowerShell Strings applied to rundll as seen in PowerShdll.dll detection: SELECTION_1: EventID: 1 SELECTION_2: Image: '*\rundll32.exe' SELECTION_3: Description: '*Windows-Hostprozess (Rundll32)*' SELECTION_4: CommandLine: '*Default.GetString*' SELECTION_5: CommandLine: '*FromBase64String*' condition: (SELECTION_1 and ((SELECTION_2) or (SELECTION_3)) and (SELECTION_4 or SELECTION_5)) falsepositives: - Unknown id: 6812a10b-60ea-420c-832f-dfcc33b646ba level: high logsource: category: process_creation product: windows modified: 2020/09/01 references: - https://github.com/p3nt4/PowerShdll/blob/master/README.md status: experimental tags: - attack.defense_evasion - attack.t1085 - attack.t1218.011 yml_filename: win_powershell_dll_execution.yml yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation