System Binary Proxy Execution: Rundll32

Course Content
This course will cover the technique:
> [T1218.011](https://attack.mitre.org/techniques/T1218/011/): System Binary Proxy Execution: Rundll32. Course 2 and course 3 happen simultaneously to each other, where msiexec is responsible for installing the intended payload, and rundll32 is responsible for downloading the applicable files required to establish the C2 channel. T1218.011 focuses on dll files, a common component within the Windows operating system. A common abuse of Dll files is where attackers will use them to obfuscate their download traffic to make it seem like Microsoft Windows is downloading standard supporting application files.>In this course, we will focus on detecting this activity and some best practices to determine if it is a legitimate rundll32 or tied to a malicious execution like Raspberry Robin.
Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary's MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.