
Summary
This rule is designed to detect the misuse of the "coregen.exe" executable, which is part of the Microsoft CoreCLR Native Image Generator. In a typical usage scenario, coregen.exe is used to generate native images for managed code to improve application startup time and performance. However, attackers may exploit this functionality to sideload malicious Dynamic Link Libraries (DLLs), thereby executing unauthorized code within the context of a legitimate process. The detection is based on querying whether coregen.exe has loaded a DLL that does not originate from a set of predefined legitimate paths. If such a condition is met, it indicates suspicious activity that may warrant further investigation. The rule primarily targets Windows environments where coregen.exe is employed and aims to alert defenders when potential DLL sideloading behavior is detected.
Categories
- Windows
Data Sources
- Process
- Image
Created: 2022-12-31