
Summary
This detection rule aims to identify potential DLL sideloading actions associated with the Aruba Networks Virtual Intranet Access service, specifically monitoring the process 'arubanetsvc.exe'. The rule leverages DLL Search Order Hijacking techniques and monitors specific criteria when the 'arubanetsvc.exe' process attempts to load certain DLLs. Suspicious DLL loads are flagged based on their locations, particularly if they are not originating from standard Windows system directories such as 'C:\Windows\System32', 'C:\Windows\SysWOW64', or 'C:\Windows\WinSxS'. This can indicate a threat actor leveraging this application to execute unauthorized code, thus helping organizations maintain their security posture by detecting privilege escalation attempts and persistence mechanisms. The detection is labeled with a high severity due to the risk associated with successful DLL sideloading, which can lead to elevated permissions for adversaries.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Image
- Application Log
Created: 2023-01-22