
Summary
This rule monitors for the installation of potentially malicious shim databases via the sdbinst.exe utility, which is a Windows command-line tool used to install and manage application compatibility shims. The detection focuses specifically on shims with uncommon extensions that may indicate a persistence mechanism used by adversaries. Attackers can exploit shims to execute arbitrary code when a targeted application runs, leading to privilege escalation or other malicious activities. The rule employs a selection filter to identify invocations of sdbinst.exe while ensuring the command line does not match known legitimate patterns, thus minimizing the chances of false positives. This detection is crucial for identifying exploitation attempts before they lead to persistent threats in a Windows environment.
Categories
- Windows
- Endpoint
- Infrastructure
Data Sources
- Process
Created: 2023-08-01