
Summary
This detection rule identifies potentially malicious behavior involving a DHCP server on Windows systems. Specifically, it triggers on the loading of a specified Callout DLL, which can indicate an attempt to inject malicious code. The detection is based on the Event ID 1033 logged by the Microsoft-Windows-DHCP-Server provider, a standard event that indicates a configuration change in the DHCP server. If an unauthorized Callout DLL is referenced in the registry and subsequently loaded by the DHCP server, it could signify a compromise or abuse of the DHCP service for nefarious purposes. The impact of this type of activity can include network configuration manipulation, where an attacker could redirect traffic, disrupt services, or execute man-in-the-middle attacks. Therefore, monitoring for this event is crucial for maintaining the security posture of the network infrastructure.
Categories
- Windows
- Network
Data Sources
- Windows Registry
- Application Log
Created: 2017-05-15