{"id":16931,"date":"2025-11-19T08:38:24","date_gmt":"2025-11-19T08:38:24","guid":{"rendered":"\/cybersecurity-blog\/?p=16931"},"modified":"2025-11-19T09:02:32","modified_gmt":"2025-11-19T09:02:32","slug":"lolbin-attacks-soc-detection-guide","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/","title":{"rendered":"LOLBin Attacks Explained with Examples: Everything SOC Teams Need to Know\u00a0"},"content":{"rendered":"\n<p>Some attacks smash the door open. LOLBins just borrow your keys and walk right in.&nbsp;<\/p>\n\n\n\n<p>They\u2019re tricky because tools everyone trusts suddenly start doing things that don\u2019t match their usual job; loading odd-looking modules, decoding files that shouldn\u2019t need decoding, or quietly handing work off to hidden <a href=\"https:\/\/any.run\/cybersecurity-blog\/powershell-script-tracer\/\" target=\"_blank\" rel=\"noreferrer noopener\">PowerShell scripts<\/a>. At first glance it all feels normal, but a closer look shows a payload slowly being set up in the background.&nbsp;<\/p>\n\n\n\n<p>For analysts, the real challenge is noticing that shift before it grows into a full incident.&nbsp;<\/p>\n\n\n\n<p>Let\u2019s take a closer look at what\u2019s hiding behind LOLBin attacks, and how advanced SOC teams uncover them in minutes without much effort.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Are LOLBin Attacks?&nbsp;<\/h2>\n\n\n\n<p>LOLBin attacks occur when threat actors repurpose legitimate Windows system binaries (rundll32, certutil, mshta, powershell, regsvr32, etc.) to carry out malicious actions. These tools are built into every system, signed by Microsoft, and widely used by normal applications, which is why attackers rely on them.&nbsp;<\/p>\n\n\n\n<p>Using LOLBins, adversaries can:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Load disguised or renamed DLLs&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Decode or unpack payloads using built-in utilities&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Trigger PowerShell or script execution indirectly&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Execute code completely in memory&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Blend malicious steps into routine system activity&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This approach lets attackers avoid dropping obvious malware and makes early-stage execution appear clean and legitimate.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why LOLBin Attacks Are a Real Risk for Businesses?&nbsp;<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/2-1-1024x576.png\" alt=\"\" class=\"wp-image-16934\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/2-1-1024x576.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/2-1-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/2-1-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/2-1-1536x864.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/2-1-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/2-1-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/2-1-740x416.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/2-1.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN&#8217;s Interactive Sandbox provides tangible results across every SOC tier<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>The real problem isn\u2019t the binaries themselves but how much <strong>visibility your SOC loses<\/strong> when attackers hide behind them. When malicious activity runs inside trusted system tools, the early signs of an intrusion become dramatically harder to catch.&nbsp;<\/p>\n\n\n\n<p>Here\u2019s what makes them dangerous:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Normal on the surface:<\/strong> Activity is routed through tools the environment already trusts.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Minimal forensic evidence:<\/strong> In-memory execution leaves few files to investigate.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Weak signature coverage:<\/strong> Microsoft-signed binaries rarely trigger basic detection rules.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Extended dwell time:<\/strong> Attackers gain more space for lateral movement and credential access.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Harder investigations:<\/strong> Clean-looking events force analysts to dig deeper to find the real issue.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Higher SOC workload:<\/strong> The team must identify subtle behavior shifts instead of relying on clear indicators.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This means attackers can establish footholds, unpack payloads, or run loaders while the environment still appears clean, leading to late detection and higher incident impact.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Fastest Way to Reveal LOLBin Abuse: How ANY.RUN Makes It Obvious&nbsp;<\/h2>\n\n\n\n<p>LOLBin attacks only work when no one can see what\u2019s really happening behind those trusted Windows binaries. <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> removes that advantage by showing analysts the full behavior in real time; not just the file name or the process label, but the actual actions taking place underneath.&nbsp;<\/p>\n\n\n\n<p>With <a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linksandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s sandbox<\/a>, \u201cnormal-looking\u201d activity turns into something you can spot immediately:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Process behavior becomes clear at a glance: <\/strong>rundll32 loading a strange module, certutil decoding an unexpected file, mshta spawning hidden PowerShell\u2026 every unusual step is visible right away.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Parent\u2013child chains tell the full story:<\/strong> Instead of digging through logs, you see exactly who launched what, and whether it fits normal usage patterns.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Command lines show the truth:<\/strong> Encoded strings, odd export calls, Temp-folder payloads, and hidden flags are exposed instantly.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>In-memory actions are no longer invisible: <\/strong>Even when attackers avoid dropping files, the sandbox reveals decoded scripts, loader behavior, and execution flow.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Artifacts stay captured: <\/strong>Renamed DLLs, extracted archives, decrypted payloads, and cleanup attempts can all be reviewed without rushing or digging.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Analysis becomes interactive: <\/strong>Analysts can click deeper, replay events, and confirm suspicions in minutes instead of piecing everything together manually.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Instead of guessing whether a trusted binary is being misused, ANY.RUN shows the exact behavior clearly, quickly, and with the context you need to act confidently.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Real-Time LOLBin Attacks Revealed Inside ANY.RUN in Minutes&nbsp;<\/h2>\n\n\n\n<p>Here are a few real LOLBin attacks captured and analyzed inside <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>.&nbsp;<br>Take a look at how these techniques unfold in real time, and see how easily your team can expose the same behavior using <a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linksandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">interactive analysis<\/a>.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. LOLBin RUNDLL32.EXE&nbsp;<\/h3>\n\n\n\n<p><strong>ATT&amp;CK\u00ae Technique:<\/strong> T1218.011 &#8211; Rundll32&nbsp;<\/p>\n\n\n\n<p><strong>What this attack is:<\/strong>&nbsp;<br>A trusted Windows utility used to load and run a disguised module, letting attackers execute their payload under a legitimate process.&nbsp;<\/p>\n\n\n\n<p><strong>See this RUNDLL32 attack exposed live inside ANY.RUN:<\/strong>&nbsp;<br><a href=\"https:\/\/app.any.run\/tasks\/c00a5ca2-7fc2-4e59-b3d2-1f45d55a03ab\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>\u2192 Gh0st RAT delivered through rundll32<\/strong><\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"698\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-9-1024x698.png\" alt=\"\" class=\"wp-image-16936\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-9-1024x698.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-9-300x205.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-9-768x524.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-9-1536x1048.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-9-2048x1397.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-9-370x252.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-9-270x184.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-9-740x505.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>rundll32.exe runs the hidden module and shows clear malicious actions<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Gh0st RAT launches the legitimate rundll32.exe, which then loads a disguised module named <strong>grgfrqe.rfg<\/strong> from an unusual directory. The file isn\u2019t a typical DLL at first glance; the strange extension is intentionally chosen to bypass simple \u201c.dll\u201d rules and blend into the system.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nExpose hidden threats with <span class=\"highlight\">ANY.RUN&#8217;s Sandbox<\/span><\/br>\nDetect evasive malware and phishing in under 60 seconds\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=LOLBin_attacks_101&#038;utm_term=191125&#038;utm_content=linktoregistration#register\/\" target=\"_blank\" rel=\"noopener\">\nSign up now\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>Once loaded, rundll32 calls an export named <strong>RAFlush<\/strong> and passes it a path to a temporary executable: <strong>C:\\Users\\admin\\AppData\\Local\\Temp\\hkjhn.exe<\/strong>.&nbsp;<\/p>\n\n\n\n<p>From there, the chain unfolds:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Load: <\/strong>rundll32 loads the renamed DLL (grgfrqe.rfg)&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Invoke:<\/strong> The RAFlush export is executed&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Drop\/execute: <\/strong>The module drops, unpacks, or runs hkjhn.exe inside %Temp%&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cleanup:<\/strong> Temporary files are removed to reduce traces&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This is a typical LOLBin pattern: a trusted binary quietly executing hidden functionality while the malicious module stays disguised and difficult to catch without behavioral visibility.&nbsp;<\/p>\n\n\n\n<p>Use this <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linktotilookup\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s TI Lookup query<\/a> to explore similar samples and collect IOCs:&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linktotilookup#%7B%22query%22:%22commandLine:%5C%22rundll32.exe*,%5C%22%22,%22dateRange%22:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">commandLine:&#8221;rundll32.exe*&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"590\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-8-1024x590.png\" alt=\"\" class=\"wp-image-16938\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-8-1024x590.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-8-300x173.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-8-768x442.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-8-1536x885.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-8-2048x1179.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-8-370x213.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-8-270x155.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-8-740x426.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Sandbox analyses showing widespread use of rundll32.exe across malicious and suspicious samples<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nEquip your team with<span class=\"highlight\"> real-time intel<\/span>\u00a0\n<\/br>from 15K SOCs and 500K analysts\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/analysis\/lookup?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=LOLBin_attacks_101&#038;utm_term=191125&#038;utm_content=linktoregistration\" target=\"_blank\" rel=\"noopener\">\nStart now\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h3 class=\"wp-block-heading\">2. LOLBin CERTUTIL.EXE&nbsp;<\/h3>\n\n\n\n<p><strong>ATT&amp;CK\u00ae Technique:<\/strong> T1140 &#8211; Deobfuscate\/Decode Files or Information&nbsp;<\/p>\n\n\n\n<p><strong>What this attack is:<\/strong>&nbsp;<br>A built-in Windows tool misused to decode, transform, or prepare hidden payloads before execution; all under the guise of a legitimate system operation.&nbsp;<\/p>\n\n\n\n<p><strong>See this CERTUTIL attack exposed live inside ANY.RUN:<\/strong>&nbsp;<br><a href=\"https:\/\/app.any.run\/tasks\/17d55fee-8faa-49e4-beee-66902bca9388\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>\u2192 PXAStealer decoding and unpacking files through certutil<\/strong><\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"681\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image3-4-1024x681.png\" alt=\"\" class=\"wp-image-16940\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image3-4-1024x681.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image3-4-300x199.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image3-4-768x510.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image3-4-1536x1021.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image3-4-2048x1361.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image3-4-370x246.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image3-4-270x179.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image3-4-740x492.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>A JPG-named WinRAR binary extracts a protected archive and drops new components<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>PXAStealer uses certutil.exe to quietly decode a disguised file named <strong>DA <\/strong><strong>\uc131\ud615\uc678\uacfc<\/strong><strong> <\/strong><strong>\uc7ac\ubb34 \ubcf4\uace0\uc11c.pdf<\/strong>. Although it appears to be a harmless PDF, certutil converts it into <strong>Invoice.pdf,<\/strong> which is not a document at all but a <strong>RAR archive<\/strong>.&nbsp;<\/p>\n\n\n\n<p>The attack continues as a renamed instance of WinRAR, disguised as a JPEG image (\ubd80\uac00\uac00\uce58\uc138 \uc601\uc218\uc99d.jpg), unpacks the archive using the password&nbsp;<br><strong>iJbcsRBR84uUl9USIhj09PH0elalyHPJ<\/strong>.&nbsp;<\/p>\n\n\n\n<p>The execution flow looks like this:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Decode:<\/strong> certutil transforms the fake PDF into an archive&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Extract:<\/strong> The disguised WinRAR instance unpacks it&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Execute:<\/strong> The payload inside the archive is launched&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cleanup:<\/strong> Files are removed or hidden to minimize traces&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This combination, a trusted decoding tool + disguised content + hidden extraction, is a classic LOLBin chain designed to slip past basic detection and appear routine unless investigated behaviorally.&nbsp;<\/p>\n\n\n\n<p>Check out more sessions of this attack and gather related IOCs using this <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linktotilookup\" target=\"_blank\" rel=\"noreferrer noopener\">TI query<\/a>:&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linktotilookup#%7B%22query%22:%22commandLine:%5C%22certutil.exe*-decode%5C%22%22,%22dateRange%22:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">commandLine:&#8221;certutil.exe*-decode&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image4-6-1024x577.png\" alt=\"\" class=\"wp-image-16944\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image4-6-1024x577.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image4-6-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image4-6-768x433.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image4-6-1536x865.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image4-6-2048x1153.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image4-6-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image4-6-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image4-6-740x417.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Several sandbox sessions highlight certutil -decode as a common step in malware chains<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">3. LOLBin MSHTA.EXE&nbsp;<\/h3>\n\n\n\n<p><strong>ATT&amp;CK\u00ae Technique:<\/strong> T1218.005 &#8211; Mshta&nbsp;<\/p>\n\n\n\n<p><strong>What this attack is:<\/strong>&nbsp;<br>A trusted Windows utility used to execute HTA-based scripts that trigger hidden PowerShell activity, enabling in-memory execution without leaving clear artifacts.&nbsp;<\/p>\n\n\n\n<p><strong>See this MSHTA attack exposed live inside ANY.RUN:<\/strong>&nbsp;<br><a href=\"https:\/\/app.any.run\/tasks\/c73df6a0-6636-4b01-897e-7e936bf7934a\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>\u2192 ReverseLoader executed through mshta + hidden PowerShell<\/strong><\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"495\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image5-4-1024x495.png\" alt=\"\" class=\"wp-image-16945\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image5-4-1024x495.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image5-4-300x145.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image5-4-768x372.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image5-4-1536x743.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image5-4-370x179.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image5-4-270x131.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image5-4-740x358.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image5-4.png 1550w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>mshta.exe runs gg.hta, which triggers hidden PowerShell execution; a clear sign of an HTA-based loader<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>In this attack chain, mshta.exe launches an HTA file named <strong>gg.hta<\/strong> from the user\u2019s desktop. The HTA isn\u2019t a simple script; it contains obfuscated logic that immediately spawns a PowerShell process configured to stay out of sight.&nbsp;<\/p>\n\n\n\n<p>PowerShell is executed with:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>-NoProfile&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>-WindowStyle Hidden&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A Base64-encoded command decoded and passed into Invoke-Expression&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This allows the payload to run <strong>entirely in memory<\/strong>, without dropping a traditional file on disk.&nbsp;<\/p>\n\n\n\n<p>Here\u2019s how the chain unfolds:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Deliver:<\/strong> The HTA file is delivered locally or through a link&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Execute:<\/strong> mshta runs the HTA script as a trusted system tool&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Decode &amp; run:<\/strong> PowerShell decodes the Base64 string and executes the logic&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stealth:<\/strong> Hidden windows and in-memory execution conceal most traces&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This mshta + encoded PowerShell combination is a well-known method for quietly loading backdoors, RATs, and script-based loaders while appearing to use legitimate system components.&nbsp;<\/p>\n\n\n\n<p>Check out more sessions of similar attacks and gather relevant data using this <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linktotilookup\" target=\"_blank\" rel=\"noreferrer noopener\">TI query<\/a>:&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linktotilookup#%7B%22query%22:%22commandLine:%5C%22mshta.exe*.hta%5C%22%22,%22dateRange%22:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">commandLine:&#8221;mshta.exe*.hta&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"588\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image6-3-1024x588.png\" alt=\"\" class=\"wp-image-16947\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image6-3-1024x588.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image6-3-300x172.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image6-3-768x441.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image6-3-1536x882.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image6-3-2048x1175.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image6-3-370x212.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image6-3-270x155.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image6-3-740x425.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Sandbox analyses showing widespread abuse of mshta.exe to run HTA-based loaders<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nReady to <span class=\"highlight\"> speed up\u00a0<\/span>investigations across your SOC?\u00a0\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=LOLBin_attacks_101&#038;utm_term=191125&#038;utm_content=linktoenterpriseform#contact-sales\" target=\"_blank\" rel=\"noopener\">\nTalk to Experts\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Strengthening Defenses Against LOLBin Techniques&nbsp;<\/h2>\n\n\n\n<p>For SOC managers, stopping LOLBin abuse starts with improving how the team spots unusual behavior inside trusted system tools. These attacks don\u2019t announce themselves, so the goal is to create clearer visibility and reduce the time analysts spend guessing what\u2019s happening.&nbsp;<\/p>\n\n\n\n<p><strong>Focus on behavior, not the binary: <\/strong>Even legitimate tools like rundll32, certutil, and mshta become suspicious when they load odd modules, decode files, or trigger hidden PowerShell. Building detections around these behaviors helps the team surface threats that signatures often miss.&nbsp;<\/p>\n\n\n\n<p><strong>Give analysts a simple triage path: <\/strong>Most LOLBin alerts look harmless at first. A lightweight checklist, parent process, command line, execution path, and any decoding or script activity, keeps investigations consistent and prevents early-stage activity from slipping by.&nbsp;<\/p>\n\n\n\n<p><strong>Use sandbox analysis to confirm suspicious cases quickly: <\/strong>Instead of piecing clues together from logs, <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> gives analysts the full picture in seconds: process chains, decoded content, dropped components, and in-memory activity. This cuts investigation time and helps the team act confidently.&nbsp;<\/p>\n\n\n\n<p><strong>Add small policy controls where possible: <\/strong>Limiting execution from user-controlled folders or applying basic PowerShell restrictions reduces the surface attackers can exploit without disrupting normal operations.&nbsp;<\/p>\n\n\n\n<p>A few focused improvements like these help SOC managers turn LOLBin activity from a hidden risk into something the team can catch early and handle efficiently.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> is a leading provider of <a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linksandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">interactive malware analysis<\/a> and <a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">threat intelligence<\/a> solutions, built to give SOC teams the visibility they need when traditional tools fall short.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Today, <strong>15,000+ organizations worldwide<\/strong> use ANY.RUN to speed up investigations, strengthen detection pipelines, and give their teams a clearer view of what\u2019s really happening on their endpoints.&nbsp;<\/p>\n\n\n\n<p>SOC teams using ANY.RUN report measurable improvements, including:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>3\u00d7 boost in SOC efficiency<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>95% faster initial triage<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Up to 58% more threats identified<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>21-minute reduction in MTTR per incident<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>Give your team the visibility they need: <a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=LOLBin_attacks_101&amp;utm_term=191125&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Try ANY.RUN now<\/a>&nbsp;<\/strong><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some attacks smash the door open. LOLBins just borrow your keys and walk right in.&nbsp; They\u2019re tricky because tools everyone trusts suddenly start doing things that don\u2019t match their usual job; loading odd-looking modules, decoding files that shouldn\u2019t need decoding, or quietly handing work off to hidden PowerShell scripts. At first glance it all feels [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":16933,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,10,34],"class_list":["post-16931","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-cybersecurity","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>LOLBin Attacks 101: How SOC Teams Can Detect Abuse Faster\u00a0<\/title>\n<meta name=\"description\" content=\"Learn how attackers misuse trusted Windows binaries and how SOC teams can spot LOLBin abuse early.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"LOLBin Attacks Explained with Examples: Everything SOC Teams Need to Know\u00a0\",\"datePublished\":\"2025-11-19T08:38:24+00:00\",\"dateModified\":\"2025-11-19T09:02:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/\"},\"wordCount\":1852,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/\",\"name\":\"LOLBin Attacks 101: How SOC Teams Can Detect Abuse Faster\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-11-19T08:38:24+00:00\",\"dateModified\":\"2025-11-19T09:02:32+00:00\",\"description\":\"Learn how attackers misuse trusted Windows binaries and how SOC teams can spot LOLBin abuse early.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"LOLBin Attacks Explained with Examples: Everything SOC Teams Need to Know\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LOLBin Attacks 101: How SOC Teams Can Detect Abuse Faster\u00a0","description":"Learn how attackers misuse trusted Windows binaries and how SOC teams can spot LOLBin abuse early.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"LOLBin Attacks Explained with Examples: Everything SOC Teams Need to Know\u00a0","datePublished":"2025-11-19T08:38:24+00:00","dateModified":"2025-11-19T09:02:32+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/"},"wordCount":1852,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/","url":"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/","name":"LOLBin Attacks 101: How SOC Teams Can Detect Abuse Faster\u00a0","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-11-19T08:38:24+00:00","dateModified":"2025-11-19T09:02:32+00:00","description":"Learn how attackers misuse trusted Windows binaries and how SOC teams can spot LOLBin abuse early.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/lolbin-attacks-soc-detection-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"LOLBin Attacks Explained with Examples: Everything SOC Teams Need to Know\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/16931"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=16931"}],"version-history":[{"count":8,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/16931\/revisions"}],"predecessor-version":[{"id":16956,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/16931\/revisions\/16956"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/16933"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=16931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=16931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=16931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}