heroui logo

DLL Sideloading by VMware Xfer Utility

Sigma Rules

View Source
Summary
This detection rule identifies potentially malicious activity involving the VMware Xfer utility (VMwareXferlogs.exe). This utility is commonly used for transferring log files, but when executed from non-standard directories (i.e., outside its default installation path), it may indicate an attempt to sideload arbitrary Dynamic Link Libraries (DLLs). Such behavior can be indicative of a hidden attack method whereby an attacker utilizes a legitimate utility to execute malicious code without raising immediate suspicion. The rule is structured to trigger an alert whenever this process is invoked from an unexpected location, indicating potential exploitation or breach attempts in the system. With the growing trend of legitimate tools being exploited for nefarious purposes, this detection plays a crucial role in reinforcing endpoint protection against evasion tactics employed by attackers.
Categories
  • Windows
  • Endpoint
  • Application
Data Sources
  • Process
Created: 2022-08-02