heroui logo

DotNet CLR DLL Loaded By Scripting Applications

Sigma Rules

View Source
Summary
This rule detects when .NET CLR (Common Language Runtime) DLLs are loaded by scripting applications such as wscript.exe, cscript.exe, and other similar executables. Such behavior can be indicative of suspicious or malicious execution, particularly when these scripting engines are used to load .NET assemblies, potentially leading to privilege escalation or executing unauthorized scripts. The detection leverages the 'image load' log source in Windows, specifically triggering on known scripting executables that are attempting to load core .NET assemblies like clr.dll, mscoree.dll, and mscorlib.dll. Since malicious actors often leverage scripting applications for injection or to bypass security mechanisms, the loading of a CLR DLL in this context is treated as a high-risk behavior, necessitating immediate investigation. The rule aims to enhance security monitoring by identifying potentially harmful processes early in their execution lifecycle.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Image
Created: 2020-10-14