
Summary
This rule is designed to detect abnormal process behavior associated with Mozilla NSS-Mozglue libraries (mozglue.dll and nss3.dll), which could indicate potential security threats. The detection relies on Sysmon Event logs, specifically EventCode 7 that captures image loaded events. Loading these libraries outside of expected applications (Firefox, Thunderbird, etc.) raises a red flag about unauthorized access or manipulation. If this behavior is confirmed as malicious, it could lead to data exfiltration or credential theft, posing a significant risk to system integrity. The detection utilizes a specific search within Sysmon data to filter legitimate processes and highlight anomalies, thus aiding in identifying and mitigating risks effectively.
Categories
- Endpoint
Data Sources
- Pod
- Container
- User Account
- Windows Registry
- Script
- Image
- Web Credential
- Named Pipe
- Certificate
- WMI
- Cloud Storage
- Internet Scan
- Persona
- Group
- Application Log
- Logon Session
- Instance
- Sensor Health
- File
- Drive
- Snapshot
- Command
- Kernel
- Driver
- Volume
- Cloud Service
- Malware Repository
- Network Share
- Network Traffic
- Scheduled Job
- Firmware
- Active Directory
- Service
- Domain Name
- Process
- Firewall
- Module
ATT&CK Techniques
- T1218.003
Created: 2025-07-16