heroui logo

Windows Unusual Process Load Mozilla NSS-Mozglue Module

Splunk Security Content

View Source
Summary
This rule is designed to detect abnormal process behavior associated with Mozilla NSS-Mozglue libraries (mozglue.dll and nss3.dll), which could indicate potential security threats. The detection relies on Sysmon Event logs, specifically EventCode 7 that captures image loaded events. Loading these libraries outside of expected applications (Firefox, Thunderbird, etc.) raises a red flag about unauthorized access or manipulation. If this behavior is confirmed as malicious, it could lead to data exfiltration or credential theft, posing a significant risk to system integrity. The detection utilizes a specific search within Sysmon data to filter legitimate processes and highlight anomalies, thus aiding in identifying and mitigating risks effectively.
Categories
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1218.003
Created: 2025-07-16