heroui logo

Potential Arbitrary DLL Load Using Winword

Sigma Rules

View Source
Summary
This rule identifies potential arbitrary Dynamic Link Library (DLL) loading through the Microsoft Word application (winword) by monitoring process creation activities. Specifically, it detects the use of the '/l' command-line flag, which could signify an attempt to sideload a malicious DLL while executing WinWord. The detection mechanism is based on analyzing certain attributes of the process creation events where winword is involved, checking for command-line parameters that include the '/l' flag alongside DLL references. If these conditions are met, the rule triggers a medium-level alert, potentially indicating a defense evasion tactic employed by malicious actors. It is important to note that this rule may produce false positives, thus warranting further investigation on flagged instances.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Command
Created: 2020-10-09