
Summary
The rule titled "Windows Known Abused DLL Loaded Suspiciously" is designed to detect instances where Dynamic Link Libraries (DLLs) that have a known history of abuse are loaded from locations that are considered unusual. This type of behavior is indicative of potential security threats, such as DLL search order hijacking or sideloading attacks, which are methods used by attackers to achieve persistence on target systems or escalate privileges through malicious code execution. The detection utilizes Sysmon Event ID 7, which captures image load events for processes. A detection search processes the Sysmon data, filtering out DLLs loaded from standard system directories like Program Files, System32, Syswow64, Winsxs, and Wbem. It then checks against a list of known hijacked libraries to identify any suspicious activity. The implementation requires modification of the Sysmon macro for proper sourcetype mapping and operational log imports to successfully execute the detection. The potential for false positives exists for legitimate uses of certain DLLs by user mode programs, emphasizing the need for careful investigation of flagged events.
Categories
- Windows
- Endpoint
- Network
Data Sources
- Windows Registry
- Image
ATT&CK Techniques
- T1574
- T1574.001
- T1574.002
Created: 2024-11-13