heroui logo

Suspicious DLL Loaded via CertOC.EXE

Sigma Rules

View Source
Summary
This detection rule identifies suspicious activities related to the loading of DLL files using the CertOC.exe application, a legitimate tool that can be exploited for malicious purposes. The rule captures process creation events where CertOC.exe is invoked with command-line options indicating the loading of a DLL, especially when the DLL resides in common temporary directories or known user locations where malware is often placed. The condition for detection is met when all the specified selection criteria (including image names and command line arguments) are satisfied, indicating a potential adversarial tactic of defense evasion through certificate-based manipulation.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2023-02-15