heroui logo

DLL Load By System Process From Suspicious Locations

Sigma Rules

View Source
Summary
This detection rule identifies instances where a system process (such as those located in 'C:\Windows\System32' or 'C:\Windows\SysWOW64') loads a Dynamic Link Library (DLL) from a suspicious location that typically should not host such files. Examples of suspicious locations include user directories like 'C:\Users\Public\' or 'C:\PerfLogs\', which are more vulnerable to unauthorized changes and use less restrictive access control. By monitoring the image load events for DLLs in these directories, the rule aims to discover potential exploitation attempts or malicious activity disguised as legitimate system behavior, enhancing the overall detection capabilities against defense evasion tactics and technique T1070 (Indicator Removal on Host). The rule emphasizes the need for vigilance around certain user-accessible folders that could facilitate attacks on the Windows operating system, particularly concerning privilege escalation and execution of rogue binaries in critical processes.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Image
Created: 2022-07-17