
Summary
This detection rule identifies instances of unsigned DLLs that are created within the last 5 minutes and subsequently loaded by a Windows service, typically 'svchost.exe'. Unsigned libraries can be indicative of malicious activities as adversaries might exploit these to maintain persistence or execute code with system-level privileges. The rule monitors library events ensuring that any DLL loaded by 'svchost.exe' is tracked for reliance on trusted signatures. If a DLL is not trusted, or has been created recently, it raises a red flag for potential nefarious activities. Furthermore, exceptions are made for known safe paths, while unusual DLL paths trigger investigations. Organizations are advised to conduct thorough analysis and investigation should any alerts be raised, paying close attention to the DLL path, creation time, and any associated hashes that might correlate to known threats.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- File
- Process
ATT&CK Techniques
- T1543
- T1543.003
- T1036
- T1036.001
- T1569
- T1569.002
Created: 2023-01-17