heroui logo

DLL Loaded From Suspicious Location Via Cmspt.EXE

Sigma Rules

View Source
Summary
This detection rule identifies instances where the 'cmstp.exe' (Microsoft Connection Manager Profile Installer) process loads Dynamic Link Libraries (DLLs) or Object Linking and Embedding (OLE) Control Extensions (OCXs) from suspicious file paths. Such paths include system directories generally associated with temporary files or unusual user data locations, which are often exploited by malware for executing payloads covertly. Specifically, the rule looks for instances where 'cmstp.exe' is executing and subsequently loading DLL or OCX files from paths such as '\PerfLogs\', '\ProgramData\', '\Users\', '\Windows\Temp\', and 'C:\Temp\'. The detection uses the condition that if 'cmstp.exe' is found and any of those specified locations are present in the loaded image, it is flagged for further scrutiny. The rule is categorized under the tactics of Defense Evasion, specifically relating to the usage of signed binary proxy execution techniques as identified by MITRE's ATT&CK framework under T1218.003, making it a critical rule for identifying potentially malicious behaviors related to DLL/OCX loading from uncommon locations.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Image
ATT&CK Techniques
  • T1218
  • T1218.003
Created: 2022-08-30