Free
System Binary Proxy Execution: Rundll32
In the course, you will learn how a malicious user can obfuscate some of their payload actions through downloaded DLL files using the built-in rundll32.exe. Using rundll32, an attacker can make their activity look like a normal Windows system binary process being executed under rundll32.
1
H
35
M
Time
intermediate
difficulty
2
ceu/cpe
Course Content
Attack, Detect and Mitigate
What is Technique T1218.011?
Raspberry Robin Lab
What is Technique T1218.011?
Course Description
This course will cover the technique:
> [T1218.011](https://attack.mitre.org/techniques/T1218/011/): System Binary Proxy Execution: Rundll32. Course 2 and course 3 happen simultaneously to each other, where msiexec is responsible for installing the intended payload, and rundll32 is responsible for downloading the applicable files required to establish the C2 channel. T1218.011 focuses on dll files, a common component within the Windows operating system. A common abuse of Dll files is where attackers will use them to obfuscate their download traffic to make it seem like Microsoft Windows is downloading standard supporting application files.>In this course, we will focus on detecting this activity and some best practices to determine if it is a legitimate rundll32 or tied to a malicious execution like Raspberry Robin.
Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary's MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.