
Summary
The detection rule for 'MSI Module Loaded by Non-System Binary' is designed to identify potential security threats arising from the loading of the msi.dll file by processes not residing in standard system directories such as System32, syswow64, windows, or winsxs. Utilizing Sysmon Event Code 7, which logs DLL load events, the rule filters out legitimate instances involving system paths to focus on potentially malicious activities. This detection is notable due to its association with known vulnerabilities including CVE-2021-41379, which relates to improper access controls that could be exploited for privilege escalation or arbitrary code execution. The rule emphasizes a proactive approach to identifying abnormal behavior indicative of DLL side-loading attacks, which could enable attackers to persist undetected within an environment and perform unauthorized actions. By leveraging a well-defined search protocol in Sysmon logs, security teams can better monitor and respond to suspicious loading of msi.dll, enhancing overall endpoint security.
Categories
- Endpoint
Data Sources
- Process
- Application Log
ATT&CK Techniques
- T1574.002
- T1574
Created: 2024-11-13