T1218.002

Control Panel

Adversaries may abuse control.exe to proxy execution of malicious payloads. The Windows Control Panel process binary (control.exe) handles execution of Control Panel items, which are utilities that allow users to view and adjust computer settings. Control Panel items are registered executable (.exe) or Control Panel (.cpl) files — the latter are renamed DLL files that export a CPlApplet function. Malicious CPL files can be delivered via phishing or executed as part of multi-stage malware. Adversaries may rename malicious DLLs with .cpl extensions and register them under HKCU\Software\Microsoft\Windows\CurrentVersion\Control Panel\Cpls. Malware families including InvisiMole and Reaver have leveraged this technique.

Microsoft Sentinel / Defender
kusto
let SuspiciousCPLPaths = dynamic(["Temp", "AppData", "Downloads", "Public", "ProgramData"]);
DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName =~ "control.exe"
| where ProcessCommandLine has ".cpl"
| extend SuspiciousPath = ProcessCommandLine has_any (SuspiciousCPLPaths)
| extend NetworkPath = ProcessCommandLine has_any ("http://", "https://", "\\\\")
| extend OfficeParent = InitiatingProcessFileName has_any ("winword.exe", "excel.exe", "outlook.exe", "powerpnt.exe")
| extend ScriptParent = InitiatingProcessFileName has_any ("wscript.exe", "cscript.exe", "mshta.exe", "cmd.exe", "powershell.exe")
| project Timestamp, DeviceName, AccountName, ProcessCommandLine, InitiatingProcessFileName,
         InitiatingProcessCommandLine, SuspiciousPath, NetworkPath, OfficeParent, ScriptParent
| sort by Timestamp desc
union (
  DeviceProcessEvents
  | where Timestamp > ago(24h)
  | where InitiatingProcessFileName =~ "control.exe"
  | where FileName in~ ("cmd.exe", "powershell.exe", "wscript.exe", "cscript.exe", "rundll32.exe", "regsvr32.exe")
  | project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
           InitiatingProcessFileName, InitiatingProcessCommandLine
  | sort by Timestamp desc
)
high severity high confidence

Data Sources

Process: Process Creation Command: Command Execution Microsoft Defender for Endpoint

Required Tables

DeviceProcessEvents

False Positives

  • Legitimate software installers that register and open CPL files from ProgramData or temp directories
  • Third-party Control Panel applets for hardware management (display drivers, audio controllers, VPN clients)
  • Enterprise IT tools that use CPL files for configuration management or deployment
  • Antivirus or security software that includes CPL-based management interfaces

Unlock Pro Content

Get the full detection package for T1218.002 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections