
Summary
This detection rule is designed to identify when Microsoft Defender's processes, specifically MpCmdRun.exe and NisSrv.exe, are blocked from loading unsigned DLLs. The rule is based on the Code Integrity (CI) engine's functioning within the Windows operating environment. It logs specific events (EventID 11 and 12) when these processes attempt to load unsigned DLL files, which could indicate an attempt by attackers to exploit these processes for malicious purposes, such as sideloading arbitrary or malicious DLLs to execute unauthorized code or perform defense evasion tactics. The focus of this rule lies in enhancing security across Windows machines by monitoring attempts to deviate from proper code integrity measures.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Application Log
Created: 2022-08-02