
Summary
This rule detects potential DLL sideloading activities of various antivirus software on Windows systems. DLL sideloading occurs when a malicious actor can load a malicious DLL masquerading as a legitimate one, which can lead to code execution and privilege escalation. The detection mechanism relies on monitoring the loading of specific DLLs associated with well-known antivirus programs such as McAfee, Symantec, Bitdefender, and others. If a DLL is loaded from a non-standard path or in a context that raises suspicion, it is flagged. The rule provides specific selections and conditions to accurately identify these instances, while also addressing potential false positives stemming from legitimate applications that may load the same DLLs. It serves as a crucial defense against evasion tactics that attackers might use to infiltrate a system by exploiting trusted software components.
Categories
- Windows
- Endpoint
Data Sources
- Image
Created: 2022-08-17