
Summary
This detection rule identifies potential DLL sideloading activities involving a malicious or unintended loading of the 'AVKkid.dll', which could indicate an attempt to execute malicious code via a legitimate process. DLL sideloading is a technique wherein an attacker places a malicious DLL file alongside legitimate executables to exploit the trust that an application has in its environment. The rule specifically looks for instances where the 'AVKkid.dll' is loaded by processes that are not legitimate, indicating a possible bypass of security measures intended to prevent the execution of unauthorized code. The detection mechanism checks if the image loaded ends with 'AVKkid.dll' and ensures that it is not being loaded by a recognized, trusted path associated with 'AVKKid.exe'. The condition is designed to minimize false positives from expected behavior while capturing anomalous activity that could suggest attack attempts.
Categories
- Windows
Data Sources
- Image
Created: 2023-08-03