
Summary
This rule is designed to detect the suspicious loading of the Windows DLLs 'dbgcore.dll' and 'dbghelp.dll' from uncommon directories, such as user directories and temporary folders. These DLLs, which typically belong to debugging tools, can be exploited for malicious purposes, particularly for credential dumping or for evading security detection mechanisms like Endpoint Detection and Response (EDR) or Antivirus (AV) tools. The detection looks for instances where these specific DLLs are loaded from unusual paths that are not standard for system operations, indicating a potential malicious behavior. The use of 'dbgcore.dll' and 'dbghelp.dll' for unauthorized actions is a common tactic among adversaries to access secure data, so flagging this activity is critical for ensuring systems are protected against these threats.
Categories
- Endpoint
- Windows
Data Sources
- Image
- Process
Created: 2025-11-27