heroui logo

Windows Potential AppDomainManager Hijack Artifacts Creation

Splunk Security Content

View Source
Summary
The rule "Windows Potential AppDomainManager Hijack Artifacts Creation" is designed to detect the creation of executable files (.exe), their corresponding configuration files (.exe.config), and dynamic link libraries (.dll) within specific directories on Windows systems. This pattern of file creation is a common indicator of potential AppDomain hijacking, a technique used by attackers to inject malicious assemblies into the AppDomain of a legitimate application. By analyzing Sysmon EventID 11, the rule identifies the simultaneous creation of these file types, which is suspicious and could signify an attempt to execute unauthorized code under the guise of a trusted application. The rule includes a comprehensive Splunk search that leverages the Endpoint data model to filter and aggregate relevant filesystem events, alerting security teams to potential threats associated with AppDomain manipulation.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • File
ATT&CK Techniques
  • T1574
  • T1574.014
Created: 2025-12-10