
Summary
This detection rule aims to identify potential security threats related to the sideloading of an unsigned dynamic link library (DLL), specifically 'mfdetours.dll,' on Windows operating systems. The rule focuses on the misuse of 'mftrace.exe', which can attach to any process and load the 'mfdetours.dll' from the executing directory, potentially as part of a defense evasion or privilege escalation attack. The detection mechanism involves monitoring image load events for instances where the DLL in question is loaded. The rule sets a filter to only consider DLLs that are not loaded from a legitimate path associated with Windows development tools. If 'mfdetours.dll' is loaded from any path that does not meet the specified criteria indicating a valid signature, an alert will be generated, marking the event as high risk. The goal is to catch attempts to misuse processes that could lead to unauthorized actions on a Windows system, reinforcing the importance of trusted libraries and ensuring that all loaded DLLs are signed and verified.
Categories
- Windows
- Endpoint
Data Sources
- Image
Created: 2023-08-11