
Summary
The 'Windows Unsigned DLL Side-Loading' detection rule identifies the creation and loading of unsigned DLLs in critical Windows directories, specifically the 'c:\windows\system32' and 'c:\windows\syswow64' folders. Using Sysmon's EventCode 7, the rule detects unsigned DLLs with unavailable signatures, which may suggest malicious activities like DLL hijacking. This technique could be used by attackers to execute unauthorized code and escalate privileges, posing a significant security threat. The detection search query filters for these characteristics and allows analysts to monitor potentially harmful events effectively. Proper implementation requires ingestion of relevant Sysmon logs, indicating the necessity for a specific Sysmon version. False positives may arise from legitimate administrative utilities that load certain DLLs outside of standard paths, necessitating careful filtering. The rule is linked to several known threats and is relevant for endpoint security monitoring.
Categories
- Endpoint
- Windows
Data Sources
- Process
- File
- Windows Registry
- Network Traffic
ATT&CK Techniques
- T1574.002
Created: 2025-01-27