heroui logo

Potential System DLL Sideloading From Non System Locations

Sigma Rules

View Source
Summary
This rule detects potential DLL sideloading from non-system locations in Windows environments, particularly focused on DLL files that are typically found in system folders like System32 and SysWOW64. DLL sideloading is a method employed by attackers to execute malicious code by loading a DLL that they have controlled into a legitimate process. This technique is often used in defense evasion, persistence, and privilege escalation attacks. The detection mechanism specified in this rule monitors for certain DLLs being loaded from unauthorized directories, which could suggest malicious intent. By checking against a comprehensive list of system DLLs, the rule aims to identify suspicious activity whilst filtering out common legitimate use cases, thereby reducing false positives.
Categories
  • Windows
  • Endpoint
Data Sources
  • Image
Created: 2022-08-14