heroui logo

Creation Of Non-Existent System DLL

Sigma Rules

View Source
Summary
This rule detects the creation of non-existent system DLLs on a Windows system, which could indicate malicious activity such as DLL hijacking. Malicious actors may place these DLLs as a means to exploit system vulnerabilities, particularly to elevate privileges or maintain persistence. The rule focuses on specific target filenames that are not typically found in the system directories, such as TSMSISrv.dll and WLBSCTRL.dll, among others. By monitoring for these instances of DLL creation, the rule aims to alert security teams to potential threats where an attacker might be attempting to execute unauthorized code in a trusted context.
Categories
  • Windows
Data Sources
  • File
Created: 2022-12-01