
Summary
This detection rule focuses on monitoring and identifying instances where a Dynamic Link Library (DLL) is loaded from a temporary directory on Windows systems. Such behavior is atypical for legitimate applications and can be indicative of malicious activity, such as DLL search order hijacking and side-loading, as adversaries often utilize writable directories like %TEMP% to execute unauthorized code. Loading DLLs from these temporary locations is particularly discreet and may evade security mechanisms, raising the necessity for vigilant monitoring. The rule leverages Sysmon's EventID 7 to capture relevant events, filtering for DLL loads specifically occurring from the %TEMP% directory while disregarding legitimate directory paths like "C:\Program Files*". This helps surface potential compromises that warrant investigation, especially regarding the originating processes and any related file activities in the same directory.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1105
Created: 2025-08-20