
Summary
The detection rule focuses on identifying suspicious file write actions involving the DLL file `iphlpapi.dll` within the `AppData\Local\Microsoft` directory. Adversaries often utilize DLL sideloading techniques, where malicious DLLs are executed alongside legitimate applications to bypass security controls. Specifically, the rule is designed to catch instances where `iphlpapi.dll` is written to a subfolder in the specified AppData path, indicating potential malicious activities related to bypassing normal execution flows using Microsoft applications. Such techniques may involve malicious documents that manipulate applications like Microsoft Teams or OneDrive to establish command and control (C&C) communication channels. The use case highlights the risk of unauthorized executions leading to persistence in systems via hijacked execution flows. This rule leverages Windows Sysmon event logs for monitoring file events pertinent to the DLL activity.
Categories
- Windows
- Endpoint
Data Sources
- File
- Process
- Application Log
ATT&CK Techniques
- T1574.002
- T1574
Created: 2024-06-06