
Summary
The "VMGuestLib DLL Sideload" detection rule identifies instances of DLL sideloading associated with the `VMGuestLib.dll`. Specifically, it focuses on the scenario where the `WmiApSrv.exe` service, part of the Windows Management Instrumentation (WMI), loads the potentially malicious `vmGuestLib.dll` from a non-standard directory such as `\VMware\VMware Tools\vmStatsProvider\win32`. The rule captures images loaded by this service and checks if the required DLL is present in the specified directory. It is essential to note that the loading of files must occur without triggering the 'signed' filter, meaning the image should be unsigned for the detection to be valid. False positives might arise in cases where a legitimate version of `vmGuestLib.dll` is already present on the system, underscoring the importance of contextual analysis before taking action. This rule is categorized under several attack techniques, indicating its relevance in detecting persistence and privilege escalation strategies employed by threat actors.
Categories
- Windows
Data Sources
- Image
Created: 2022-12-01