heroui logo

Files With System DLL Name In Unsuspected Locations

Sigma Rules

View Source
Summary
This detection rule targets the creation of files with a ".dll" extension, specifically those named after system DLLs, located in uncommon or unexpected directories outside of the standard system locations like "System32" or "SysWOW64". Such behavior is often indicative of malicious activities, as attackers may attempt to disguise their payloads as legitimate system files to evade detection. The rule is configured to monitor file creation events and will trigger alerts when a file matching the specified criteria is detected. To avoid potential false positives—such as legitimate third-party software that may also use specific system DLL names bundled within their applications—users are advised to establish a baseline environment before deploying this rule in a production context. The detection operates via a conditional filter ensuring that the flagged file is not found in several high-traffic, benign directories. This enhances the reliability of the alerts and helps focus the investigation on genuinely suspicious file creation events.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
Created: 2024-06-24