Skip to content

<<< Hide Navigation Hide TOC >>>

Invoke-Obfuscation Via Use Rundll32 - PowerShell (a5a30a6e-75ca-4233-8b8c-42e0f2037d3b)

Detects Obfuscated Powershell via use Rundll32 in Scripts

Galaxy ColorsAttack Pat...Sigma-Rule...
Rows: 3
Loading extensions...
Collapse filters
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators:
<, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx:
Learn more

TableFilter v0.7.2

https://www.tablefilter.com/
©2015-2025 Max Guglielmi
?
Cluster A Galaxy A Cluster B Galaxy B Level
PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) Attack Pattern Invoke-Obfuscation Via Use Rundll32 - PowerShell (a5a30a6e-75ca-4233-8b8c-42e0f2037d3b) Sigma-Rules 1
Obfuscated Files or Information - T1027 (b3d682b6-98f2-4fb0-aa3b-b4df007ca70a) Attack Pattern Invoke-Obfuscation Via Use Rundll32 - PowerShell (a5a30a6e-75ca-4233-8b8c-42e0f2037d3b) Sigma-Rules 1
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) Attack Pattern PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) Attack Pattern 2