heroui logo

Windows Remote Access Software BRC4 Loaded Dll

Splunk Security Content

View Source
Summary
This detection rule identifies the loading of four specific Windows Dynamic Link Libraries (DLLs) — credui.dll, dbghelp.dll, samcli.dll, and winhttp.dll — by processes that are not standard or expected. It utilizes Sysmon's EventCode 7, which logs DLL load events, to track instances where all four DLLs are loaded within a 30-second timeframe. The presence of these DLLs, particularly when loaded quickly in succession, is a strong indicator of the Brute Ratel C4 remote access tool, known for its capabilities in credential dumping and facilitating unauthorized access to systems. If such behavior is detected, it suggests heightened risk of credential theft and system compromise, warranting further investigation and potentially immediate containment actions.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
ATT&CK Techniques
  • T1219
  • T1003
Created: 2024-11-13