heroui logo

Potential DLL Sideloading Via VMware Xfer

Sigma Rules

View Source
Summary
This detection rule identifies potential DLL sideloading through the VMware Transfer (Xfer) utility. Sideloading occurs when a malicious actor exploits a legitimate process to load a harmful DLL from a non-default directory, often to bypass security measures. The rule focuses on instances where the Xfer utility (VMwareXferlogs.exe) attempts to load a specific DLL (glib-2.0.dll) away from its expected directory. The filtering condition specifies that the loading must occur from the C:\Program Files\VMware\ directory, thus capturing anomalies in the software's behavior that could indicate an attempted attack. The rule has a high severity level given its implications for defense evasion by malware operators and is based on findings from recent security research regarding LockBit ransomware. False positives are considered unlikely, enhancing the reliability of the detection.
Categories
  • Windows
  • Endpoint
  • Infrastructure
Data Sources
  • Process
  • Image
Created: 2022-08-02