
Summary
This detection rule focuses on identifying potential DLL sideloading exploits involving the "RjvPlatform.dll" and the binary "SystemResetPlatform.exe." The detection specifically targets instances where the "SystemResetPlatform.exe" executable, located in the "C:\Windows\System32\SystemResetPlatform\" directory, loads "RjvPlatform.dll" from a non-standard location—namely, the "C:\$SysReset\Framework\Stack\" directory, which is not created by default on Windows systems. This behavior can be indicative of an attempt to exploit the executable for privilege escalation or evading security measures, as attackers may utilize this method to load malicious libraries without proper permissions or detection. The rule employs image load logging to flag this activity when the specified condition is met, thereby enabling security teams to take appropriate action in response to any malicious DLL loading attempts.
Categories
- Windows
- Endpoint
Data Sources
- Image
Created: 2023-06-09