Summary

  • The analyzed alert is a Windows Defender Evasion Attempt, which was triggered on September 12, 2024 at 7:09 AM on a machine named Elenora.
  • The IP address originating the attack is 172.16.17.126, and the trigger command within the process named RUNDLL32.EXE includes remnants of previous brute force attempts from IP 89.187.177.73.
  • The attacker utilized a combination of rundll32 and vbscript to execute the command calc.exe in order to potentially bypass Windows Defender defenses.
  • The EDRAVAction was Not Detected, and the L1Notes indicate that the analyst saw brute force attempts before the alert, but couldn’t determine if they were successful.
  • The reason for the alert is the combination of rundll32 and vbscript, which is often used for malicious purposes, and could be intended to bypass Defender’s detection and protection capabilities.

By Ghostploit

Original Article