← Back to SOC feed Coverage →

Rundll32 (LOLBins and LOLScripts, Normalized Process Events)

kql MEDIUM Azure-Sentinel
T1218.011
imProcessCreate
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-04-22T09:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may use Rundll32 to execute malicious payloads through signed binaries or scripts, leveraging its commonality to evade detection. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential proxy execution tactics used in advanced persistent threats.

KQL Query

imProcessCreate
| where Process has "rundll32.exe"
// Uncomment the next line and add your commandLine Whitelisted/ignore terms.For example "payload.dll"
// | where CommandLine !contains ("payload.dll") 
| extend HostCustomEntity = Dvc, AccountCustomEntity = User

Analytic Rule Definition

id: 365a889c-ae0f-461d-bdf1-d6ce11d0ef6f
name: Rundll32 (LOLBins and LOLScripts, Normalized Process Events)
description: |
  'This detection uses Normalized Process Events to hunt Signed Binary Proxy Execution: Rundll32 activities'

requiredDataConnectors: []

tactics:
  - DefenseEvasion
relevantTechniques:
  - T1218.011
query: |
  imProcessCreate
  | where Process has "rundll32.exe"
  // Uncomment the next line and add your commandLine Whitelisted/ignore terms.For example "payload.dll"
  // | where CommandLine !contains ("payload.dll") 
  | extend HostCustomEntity = Dvc, AccountCustomEntity = User

entityMappings:
  - entityType: Account
    fieldMappings:
      - identifier: FullName
        columnName: AccountCustomEntity
  - entityType: Host
    fieldMappings:
      - identifier: FullName
        columnName: HostCustomEntity

Required Data Sources

Sentinel TableNotes
imProcessCreateEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/ASimProcess/inProcess_SignedBinaryProxyExecutionRundll32.yaml