heroui logo

Potential Mpclient.DLL Sideloading Via Defender Binaries

Sigma Rules

View Source
Summary
This detection rule focuses on identifying potential side-loading of the 'mpclient.dll' file by Windows Defender-related processes, specifically 'MpCmdRun.exe' and 'NisSrv.exe', when executed from directories other than their default installation paths. Side-loading can be a technique used by attackers to load malicious DLLs in a trusted process, which in this context could indicate an attempt to abuse Windows Defender to execute unauthorized code. The rule checks for process creation events related to these Defender binaries and filters out legitimate executions based on their typical file paths in order to minimize false positives. This makes it a critical detection for monitoring potential evasion tactics leveraging trusted system processes.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-08-01