heroui logo

DLL Concatenation

Anvilogic Forge

View Source
Summary
This detection rule identifies the use of DLL concatenation techniques, specifically observing threat actors utilizing the Impacket library to concatenate the malicious Stowaway proxy tool (msoe.dll) with other DLLs from the system32 directory into a single DLL named appmgmt.dll. This method is often employed to facilitate malware deployment and achieve evasion by obfuscating the malicious code through padding. The rule focuses on detecting system commands that create triggers for concatenation activities, specifically using commands such as copy, robocopy, or xcopy, as well as using type commands that redirect output to .dll file references. Notably, these commands must be executed in a manner that initiates a new process. The rule utilizes Splunk queries to capture events related to process creation with specific focus on copy commands involving .dll files. By employing regex patterns within the command logic, it effectively filters and identifies potentially malicious activities aimed at creating or modifying .dll files in a suspicious manner.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1036
  • T1027.001
  • T1027
Created: 2024-02-09