
Summary
This detection rule identifies instances of a Windows trusted program that are known to be vulnerable to DLL Search Order Hijacking. By focusing on programs like WinWord.exe, EXPLORER.EXE, w3wp.exe, and DISM.EXE, the rule aims to discern potentially malicious activities that exploit DLL loading mechanisms in an effort to evade security defenses. The detection employs an EQL query to analyze process startup events, checking whether the original file names match those of the trusted programs while also monitoring if these processes are executed from non-standard, atypical paths. Such behavior may indicate a sophisticated attempt to load malicious DLLs in the memory space of trusted applications. Furthermore, the investigation guide outlines crucial investigative steps to validate findings, managing potential false positives arising from legitimate software behavior while emphasizing necessary incident response actions to mitigate identified threats.
Categories
- Endpoint
- Windows
- Cloud
- Application
- Identity Management
Data Sources
- Process
- Windows Registry
- Application Log
- Logon Session
- User Account
ATT&CK Techniques
- T1036
- T1574
- T1574.002
Created: 2020-09-03