
Summary
This rule detects suspicious processes that load the RstrtMgr.dll (Restart Manager) within the Windows environment. Recent exploitation of this specific DLL has been noted in various ransomware operations, including Conti and Cactus ransomware, where it is utilized to terminate processes that could obstruct file encryption, leading to significant operational impacts during an attack. Additionally, the BiBi wiper malware has been documented to employ RstrtMgr.dll for destructive purposes. The detection mechanism leverages Windows image loading events to trigger alerts when processes load the DLL from specific paths indicative of suspicious behavior. By identifying these patterns, the rule aims to enhance monitoring for potential ransomware activities or advanced persistent threats that utilize this DLL for anti-analysis or disruptive functions.
Categories
- Windows
- Endpoint
- Network
Data Sources
- Process
- Image
- Logon Session
Created: 2023-11-28