heroui logo

Suspicious DLL Loaded for Persistence or Privilege Escalation

Elastic Detection Rules

View Source
Summary
The rule titled 'Suspicious DLL Loaded for Persistence or Privilege Escalation' is designed to detect the loading of non-Microsoft signed DLLs that are either absent from a default Windows install or that can be loaded from alternate locations by native Windows processes. This behavior is indicative of potential malicious activity where attackers leverage DLL hijacking to achieve persistence or escalate privileges. The detection mechanism leverages EQL (Event Query Language) to identify suspicious DLL activity by filtering events that denote process image loading and cross-referencing known DLLs that should not be present or signed. The rule provides a comprehensive triage and analysis framework for investigating incidents, detailing investigation steps, false positive analysis, and response protocols to mitigate identified threats effectively.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Network Traffic
  • Logon Session
ATT&CK Techniques
  • T1574
  • T1574.002
  • T1574.001
  • T1036
  • T1036.001
Created: 2020-01-07