Query Details
# Rule : Thunderbird rnpkeys.exe DLL Hijacking - StealC InfoStealer ## Description This detection rule identifies the execution of `rnpkeys.exe` associated with the Thunderbird email client. The `rnpkeys.exe` process is related to the handling of cryptographic keys in Thunderbird. Monitoring this process is essential because it could be exploited by malicious actors to manipulate encryption keys, potentially compromising secure communications. According to the MITRE ATT&CK framework, such manipulations fall under "DLL Search Order Hijacking" (T1574.001), where adversaries may exploit the search order to load malicious DLLs. This rule helps detect and audit the usage of `rnpkeys.exe` within Thunderbird, ensuring that only legitimate key operations are performed and providing an early warning for potential malicious activities. Seen in version 115.6.0 and the dll file name is rnp.dll - [MITRE ATT&CK: DLL Search Order Hijacking](https://attack.mitre.org/techniques/T1574/001/) ## Detection Logic ### DeviceProcessEvents - Monitors `DeviceProcessEvents` for events where: - The `FileName` contains "rnpkeys.exe". - The `ProcessVersionInfoProductName` is "Thunderbird". ### DeviceImageLoadEvents - Monitors `DeviceImageLoadEvents` for events where: - The `InitiatingProcessFileName` contains "rnpkeys.exe". ## Tags - Thunderbird - Cryptographic Keys - rnpkeys.exe - Email Security - Process Monitoring - DLL Search Order Hijacking - MITRE ATT&CK T1574.001 - Suspicious Activity ## Search Query ```kql DeviceProcessEvents | where FileName contains "rnpkeys.exe" | where ProcessVersionInfoProductName == "Thunderbird" ``` ```kql DeviceImageLoadEvents | where InitiatingProcessFileName contains "rnpkeys.exe" ```
This query is designed to detect suspicious activity related to the rnpkeys.exe process in the Thunderbird email client. Here's a simplified summary:
The query aims to identify and monitor the execution of rnpkeys.exe, a process in Thunderbird that handles cryptographic keys. This is important because malicious actors could exploit this process to load harmful DLLs, compromising secure communications.
rnpkeys.exe and the product name is Thunderbird.rnpkeys.exe is the initiating process.Monitoring rnpkeys.exe helps ensure that only legitimate operations are performed, providing an early warning for potential malicious activities like DLL hijacking.
The query is associated with Thunderbird, cryptographic keys, email security, process monitoring, and the MITRE ATT&CK framework technique for DLL Search Order Hijacking (T1574.001).
The KQL (Kusto Query Language) snippets provided filter events to find instances where rnpkeys.exe is executed or initiates other processes, specifically within the Thunderbird application.

Ali Hussein
Released: July 17, 2024
Tables
Keywords
Operators