heroui logo

Windows Hijack Execution Flow Version Dll Side Load

Splunk Security Content

View Source
Summary
This detection rule targets the specific event of a process loading a version.dll file from directories outside of the expected Windows system folders (%windir%\system32 or %windir%\syswow64). It utilizes Sysmon Event ID 7 to monitor these occurrences, recognizing concerns about unsigned or misplaced version.dll files which are often exploited by ransomware and APT (Advanced Persistent Threat) malware campaigns, such as Brute Ratel C4. These activities can potentially allow attackers to execute arbitrary code, establish persistence, and compromise infected systems, making this rule a critical line of defense.
Categories
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1574.001
  • T1574
Created: 2024-11-13