
Summary
The rule 'Execution DLL of Choice Using WAB.EXE' is designed to detect a potential defense evasion tactic used by malicious actors to manipulate the Windows address book executable, WAB.EXE. This rule triggers when the registry key that specifies the DLL path for WAB.EXE is modified to point to a non-default library. When WAB.EXE is executed, it attempts to load the DLL defined in the registry; a deviation from the standard DLL path indicates possible malicious behavior intended to execute arbitrary code or evade traditional detection mechanisms. The detection mechanism relies on monitoring specific registry changes and ensures that deviations from legitimate behavior are flagged for review. Given the potential for exploitation, this rule is classified with a high severity level to assist immediate response teams in spotting security incidents that involve registry manipulation and DLL injection.
Categories
- Windows
Data Sources
- Windows Registry
Created: 2020-10-13