
Summary
This rule aims to detect DLL sideloading associated with third-party software, focusing on specific applications like Lenovo and Toshiba utilities. DLL sideloading is an evasion technique where an attacker places a malicious DLL in a location where a legitimate application will load it instead of the genuine DLL, leading to unexpected behavior or privilege escalation. The detection rule identifies instances where the legitimate applications from Lenovo and Toshiba load specific DLLs (commfunc.dll and tosbtkbd.dll), but only when these DLLs do not originate from their expected directories. By ensuring that the DLL is not loaded from common application paths (e.g., AppData for Google Chrome or specified installation directories for Lenovo and Toshiba), the rule attempts to identify potentially malicious activity that could be indicative of a larger compromise or security incident.
Categories
- Windows
- Endpoint
Data Sources
- Image
Created: 2022-08-17