heroui logo

Driver/DLL Installation Via Odbcconf.EXE

Sigma Rules

View Source
Summary
This detection rule focuses on identifying the execution of the `odbcconf.exe` binary with the parameter `INSTALLDRIVER`, which is commonly exploited by attackers to install malicious ODBC drivers. The detection logic uses process creation logs from Windows to monitor commands that contain specific sequences indicative of the installation of a driver, particularly looking at `.dll` files. Given that `odbcconf` is a legitimate tool for configuring ODBC data sources, its abuse for installing malicious DLLs poses a significant security risk, necessitating vigilance whenever this binary is invoked. False positives may arise when legitimate drivers are registered using `odbcconf`, hence a thorough investigation into the path and content of the DLL is advisable to distinguish between benign and malicious activities.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2023-05-22