heroui logo

Potential DLL Sideloading Via JsSchHlp

Sigma Rules

View Source
Summary
This detection rule identifies potential DLL sideloading attacks utilizing the JUSTSYSTEMS Japanese word processor, particularly focusing on the loading of the JSESPR.dll file. DLL sideloading is a technique where a malicious DLL file is loaded into a legitimate process, potentially allowing an attacker to execute arbitrary code within the context of that process. The detection logic employed here focuses on monitoring the ImageLoaded events for Windows processes to check for any instances where the target DLL is being loaded, excluding the situations where the DLL is being loaded from its proper directory. False positives could occur due to the legitimate use of JSESPR.dll in various applications. However, since the strategy aims to identify suspicious loading behavior, it poses a medium alert level due to its implications for persistence and privilege escalation attempts in the context of defense evasion strategies.
Categories
  • Windows
Data Sources
  • Image
Created: 2022-12-14