heroui logo

Potential DLL Sideloading Of Libcurl.DLL Via GUP.EXE

Sigma Rules

View Source
Summary
This detection rule identifies potential DLL sideloading attacks involving the 'libcurl.dll' file, specifically when loaded by the 'gup.exe' process. DLL sideloading is a method that adversaries use to execute malicious code by tricking a legitimate application into loading a compromised or malicious DLL. The rule focuses on the loading of 'libcurl.dll' from uncommon file paths that do not typically host legitimate versions of this library. The detection mechanism leverages the 'image_load' log source category on Windows systems to monitor for the occurrence of this behavior. A specific condition is employed to ensure that events where 'gup.exe' is running and loading 'libcurl.dll' are flagged, with an exclusion for instances where GUP.exe is executed from legitimate Notepad++ updater directories. This selective monitoring helps to reduce false positives and increase the accuracy of detection, making it an essential rule for identifying potentially malicious activity in a Windows environment.
Categories
  • Windows
Data Sources
  • Image
Created: 2023-05-05