heroui logo

New DNS ServerLevelPluginDll Installed Via Dnscmd.EXE

Sigma Rules

View Source
Summary
This rule detects the installation of a DNS Server Level Plugin DLL through the use of the `dnscmd.exe` utility. The detection mechanism is based on monitoring process creation events where the command line contains specific parameters indicating that a plugin DLL is being configured. Specifically, it looks for instances where `dnscmd.exe` is invoked with the `/config` and `/serverlevelplugindll` parameters. This type of plugin can execute code within the context of the DNS server, which is a significant security concern, as it may be exploited by attackers to manipulate DNS requests or responses. Restarting the DNS service may be necessary for the changes to take effect. If detected, it may indicate an attempt to bypass security measures or install malicious code. The rule is applicable in a Windows environment and highlights the need for careful monitoring of DNS server configurations to prevent unauthorized access or actions. References provided detail the potential vulnerabilities associated with DNS plugin injections, emphasizing the importance of vigilance in DNS management.
Categories
  • Windows
  • Network
  • Endpoint
Data Sources
  • Process
Created: 2017-05-08