Free

System Binary Proxy Execution: Rundll32

In the course, you will learn how a malicious user can obfuscate some of their payload actions through downloaded DLL files using the built-in rundll32.exe. Using rundll32, an attacker can make their activity look like a normal Windows system binary process being executed under rundll32.
1
35
M
Time
intermediate
difficulty
2
ceu/cpe

Course Content

Raspberry Robin Lab

0m

What is Technique T1218.011?
Attack, Detect and Mitigate

20m

What is Technique T1218.011?
Course Description

This course will cover the technique:

> [T1218.011](https://attack.mitre.org/techniques/T1218/011/): System Binary Proxy Execution: Rundll32. Course 2 and course 3 happen simultaneously to each other, where msiexec is responsible for installing the intended payload, and rundll32 is responsible for downloading the applicable files required to establish the C2 channel. T1218.011 focuses on dll files, a common component within the Windows operating system. A common abuse of Dll files is where attackers will use them to obfuscate their download traffic to make it seem like Microsoft Windows is downloading standard supporting application files.

>In this course, we will focus on detecting this activity and some best practices to determine if it is a legitimate rundll32 or tied to a malicious execution like Raspberry Robin.

Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary's MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.

This course is part of a Career Path:
No items found.

Instructed by

Master Instructor
Matthew Mullins

Matt has led multiple Red Team engagements, ranging from a few weeks to a year and covering multiple security domains. Outside of Red Teaming, Matt is also a seasoned penetration tester with interests in: AppSec, OSINT, Hardware, Wifi, Social Engineering, and Physical Security. Matt has a Master's degree in Information Assurance and an exhaustive number of certifications ranging from frameworks, management, and hands-on hacking. Matt is a Technical SME at Cybrary, focusing on Adversarial Emulation and Red Teaming for course content.

Instructor
Owen Dubiel

Owen is certified in the GIAC GSEC, CompTIA CySA+, and various other vendor-related certifications. He works both as a technical security engineer and as an SME architect instructor in his spare time. Spreading the word of cyber security is a passion of his. Owen lives in Southeast Michigan with his beautiful wife, daughter, and his dog, Thor. In his free time, Owen enjoys watching sports and movies, and spending time with his family.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a System Binary Proxy Execution: Rundll32 Certificate of Completion