HackTool - F-Secure C3 Load by Rundll32

Last updated on:

Rule name

Rule type

Log sources

MITRE ATT&CK tags

Severity

HackTool - F-Secure C3 Load by Rundll32

Standard

Windows

Defense Evasion: System Binary Proxy Execution - Rundll32 (T1218.011)

Trouble

About the rule

Rule Type

Standard

Rule Description

Rundll32.exe is a legitimate Windows utility used to execute code from DLL files. Attackers commonly exploit Rundll32 to proxy malicious DLL execution, evade detection, and leverage living-off-the-land techniques. F-Secure C3 (Cubert) is an advanced red team command, control, and relay framework, often used by both security professionals and threat actors. This rule detects suspicious invocations of Rundll32.exe used to load components associated with the F-Secure C3 toolkit, based on command-line patterns, module names, or network behavior.

Severity

Critical

Rule journey

Attack chain scenario

Initial access → Execution → Abuse of Rundll32.exe loading F-Secure C3 component → Establishment of covert command and control channel → Impact

Impact

  • Defense evasion
  • Unauthorized remote access
  • Malicious code execution
  • Lateral movement
  • Data exfiltration

Rule Requirement

Prerequisites

Use the Group Policy Management Console to audit process creation and process termination.

Install Sysmon from Microsoft Sysinternals and download the Sysmon configuration file that includes process creation monitoring. Add network connection events to the configuration file to monitor all network activity.

Create a new registry key "Microsoft-Windows-Sysmon/Operational" in the directory "Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\" if not already created.

Criteria

Action1: actionname = "Process started" AND COMMANDLINE contains "rundll32.exe" AND COMMANDLINE contains ".dll" AND COMMANDLINE contains "StartNodeRelay" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

MITRE ATT&CK

Defense Evasion: System Binary Proxy Execution - Rundll32 (T1218.011)

Security Standards

Enabling this rule will help you meet the security standard's requirement listed below:

DE.CM-01: Networks and network services are monitored to find potentially adverse events.

When this rule is triggered, you’re notified of a suspicious use of Rundll32.exe to load an F-Secure C3 module. This enables you to scrutinize process creation, analyze DLL file origins, monitor network connections originating from Rundll32.exe, and promptly identify attempts to abuse LOLBins (living-off-the-land binaries) for covert command and control.

Author

Alfie Champion (ajpc500)

Future actions

Known False Positives

This rule may be triggered during authorized internal red team exercises or legitimate use of C3 by security teams for sanctioned testing. Always validate the activity against approved red team schedules, consult with security operations or penetration testing teams, and review command-line parameters and source DLL paths for legitimacy.

Next Steps

When this rule is triggered, the following measures can be implemented:

  1. Identification: Identify if the flagged event is a new incident or part of an existing incident.
  2. Analysis: Analyze the impact and extent of the incident to comprehend the severity of the attack using the Incident Workbench.
  3. Response: Respond promptly by initiating an automated workflow to interrupt the network connections and cease the malicious process.
  4. Reconfiguration: Update allowlists and red team schedules, refine detection rules to reduce false positives, and continue monitoring for variants in Rundll32 and C3 Toolkit usage.

Mitigation

Mitigation ID

Mitigation Name

Mitigation description

M1050


Exploit Protection

Microsoft's Enhanced Mitigation Experience Toolkit (EMET) Attack Surface Reduction (ASR) feature can be used to block methods of using rundll32.exe to bypass application control.