heroui logo

Potential Goopdate.DLL Sideloading

Sigma Rules

View Source
Summary
This detection rule identifies potential DLL sideloading attempts involving the file 'goopdate.dll', utilized by the Google Update service ('googleupdate.exe'). The rule triggers when an image is loaded that ends with 'goopdate.dll'. To minimize false positives, it includes filtering conditions that check if the loading image is located in standard installation directories like 'C:\Program Files' or 'C:\Program Files (x86)'. Additionally, it has optional filters to exclude scenarios where the DLL might be loaded from temporary Dropbox installer locations. The detection method works by monitoring the presence of specific directory paths and file names to pinpoint anomalous behaviors that could indicate a privilege escalation or defense evasion attack through malicious DLL sideloading. As the loading of the DLL from expected locations might raise false alarms, users are advised to apply further restrictions based on their environment to enhance accuracy.
Categories
  • Windows
  • Endpoint
  • Infrastructure
Data Sources
  • Image
Created: 2023-05-15