Query Details
Tags:
Query:
DeviceProcessEvents
| where InitiatingProcessFileName contains "rundll" or InitiatingProcessVersionInfoInternalFileName == @"rundll"
| where FileName has_any ("cmd.exe","powershell", "powershell_ise") and InitiatingProcessCommandLine !contains @"zzzzInvokeManagedCustomActionOutOfProc"
References:
Notes:
Sure, here's a simple summary of the query:
This query is searching through device process events to find instances where a process related to "rundll" has started another process. Specifically, it looks for cases where:
In essence, it's filtering for suspicious activity where "rundll" is used to start command-line tools, but excluding a specific known command line pattern.

Ali Hussein
Released: October 3, 2023
Tables
Keywords
Operators