
Summary
This detection rule aims to identify attempts to exploit a vulnerability known as Trusted Path Bypass in Windows operating systems. The exploit leverages spoofed Windows directory paths by introducing an extra space character, such as in the maliciously modified path 'C:\Windows \System32'. This manipulation tricks the operating system into considering the path as trusted, which allows the execution of malicious DLLs that could otherwise be restricted under normal security protocols, including User Account Control (UAC). This can lead to unauthorized privilege escalation, as the loaded DLLs run with high integrity privileges. The rule focuses on analyzing the `ImageLoaded` event to spot any instances where DLLs are loaded from these manipulated paths, thus serving as an important detection mechanism to prevent exploitation of this vulnerability.
Categories
- Windows
Data Sources
- Image
Created: 2025-06-17