
Summary
This rule identifies potential arbitrary Dynamic Link Library (DLL) loading through the Microsoft Word application (winword) by monitoring process creation activities. Specifically, it detects the use of the '/l' command-line flag, which could signify an attempt to sideload a malicious DLL while executing WinWord. The detection mechanism is based on analyzing certain attributes of the process creation events where winword is involved, checking for command-line parameters that include the '/l' flag alongside DLL references. If these conditions are met, the rule triggers a medium-level alert, potentially indicating a defense evasion tactic employed by malicious actors. It is important to note that this rule may produce false positives, thus warranting further investigation on flagged instances.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Command
Created: 2020-10-09