
Summary
This detection rule monitors for abnormal execution of the 'odbcconf.exe' process, specifically when the Dynamic Link Library (DLL) being registered is found in paths that are typically associated with suspicious activities. DLL registration via 'odbcconf' is a common tactic employed by attackers to establish persistence or execute malicious code. The detection focuses on command-line arguments and image names related to 'odbcconf.exe', capturing instances where the DLL paths reflect known high-risk directories such as 'Temp', 'ProgramData', and system directories that could be misused. By identifying processes executing from these locations, this rule aims to highlight potential defense evasion tactics. It is important to ensure that legitimate operations are not unduly flagged, and hence, the likelihood of false positives is considered low. To leverage this rule, environments need to be monitored closely for any occurrence of the specified command line patterns indicating suspicious DLL registrations.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2023-05-22