heroui logo

Windows Known Abused DLL Created

Splunk Security Content

View Source
Summary
The detection rule 'Windows Known Abused DLL Created' aims to identify the creation of Dynamic Link Libraries (DLLs) that have a known history of exploitation, particularly in unusual locations. It utilizes data sourced from Endpoint Detection and Response (EDR) agents, focusing on analyzing both process and filesystem events. This detection is crucial as it helps uncover potential malicious activities like DLL search order hijacking or sideloading, techniques commonly employed by attackers to execute unauthorized code or escalate privileges within a system. Confirmed instances of such activities could indicate a serious threat, potentially allowing attackers to seamlessly blend malicious operations with legitimate processes, thus undermining system integrity and security. The rule is built on sophisticated queries leveraging specific Sysmon event IDs to monitor for these DLL creations.
Categories
  • Windows
  • Endpoint
Data Sources
  • Pod
  • File
  • Process
ATT&CK Techniques
  • T1574
  • T1574.001
  • T1574.002
Created: 2024-11-13