
Summary
This rule is designed to detect potential threats related to the loading of unsigned DLLs (Dynamic Link Libraries) from locations deemed suspicious by the Code Integrity (CI) engine on Windows systems. It specifically focuses on system events (EventID: 11 and 12) that indicate attempts to execute unsigned binaries from directories known for hosting potentially malicious files, such as Public folders, Desktop, Downloads, or temporary file locations like Temp directories. The monitoring of these locations is crucial as attackers frequently exploit such directories to execute unverified code that can compromise system integrity. By implementing this detection rule, organizations can enhance their security posture by identifying and mitigating risks associated with the execution of untrusted code that could aid in evasion tactics or facilitate further attacks. The rule's configuration mentions that it operates under the Windows security mitigations log, leveraging active monitoring to flag instances for further investigation or automated response mechanisms.
Categories
- Windows
- Endpoint
Data Sources
- Process
- File
Created: 2022-08-03