heroui logo

DLL Loaded via CertOC.EXE

Sigma Rules

View Source
Summary
This detection rule identifies the use of CertOC.exe to load DLL files, which is a tactic often employed for defense evasion. The rule focuses on process creation events where CertOC.exe is invoked with specific command-line arguments that indicate a DLL loading operation. The conditions set for detection require the rule to match certain criteria: CertOC.exe must be the process that is creating a child process and must include the command-line argument '-LoadDLL'. This combination suggests that a certificate is being installed, potentially maliciously, by loading a target DLL. The rule's medium severity level indicates that while this activity could be legitimate in some scenarios, it may also indicate an attempt to circumvent security measures, warranting further investigation. The referenced external links provide additional context on the detection method and its implications in broader threat landscapes, particularly concerning certificate-related exploitation techniques.
Categories
  • Endpoint
Data Sources
  • Process
Created: 2021-10-23