heroui logo

Shim Database Installation With Suspicious Parameters

Splunk Security Content

View Source
Summary
This detection rule identifies the execution of the Windows executable `sdbinst.exe` with parameters that suggest the silent installation of a shim database, a technique used by malicious actors to intercept and manipulate API calls. By analyzing telemetry data from Endpoint Detection and Response (EDR) solutions, the rule focuses on crucial details such as process names, command-line arguments, and their parent processes to flag potentially harmful activities. The significance of detecting shim database installations lies in their potential to allow an attacker to bypass security measures, execute unauthorized code, and maintain persistence on compromised systems. The rule employs various logs including Sysmon EventID 1 and Windows Event Log Security 4688 to ensure comprehensive coverage of relevant events. It leverages a specific search query to filter out benign usage of the executable while preserving alerts for potentially malicious instances.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1546.011
  • T1546
Created: 2024-12-16