
Summary
This detection rule identifies potential DLL Search Order Hijacking attacks that exploit the presence of spaces in paths resembling legitimate Windows system folders. Attackers may create folders such as 'C:\Windows ' or 'C:\Program Files ' (with a trailing space) to trick the Windows Operating System into loading DLLs from these directories instead of the legitimate system directories. This rule monitors file events in the Windows environment to detect instances where a file with a '.dll' extension is targeted by paths that begin with recognized Windows system folder names but contain an additional space character. This form of attack can lead to privilege escalation and persistence by allowing malicious DLLs to be executed in place of legitimate ones. The context of the rule generates high severity alerts since successful execution of such tricks may compromise the integrity and security of the system. Recommended actions upon detection include a thorough examination of the implicated file paths and the associated processes to ascertain if malevolent activity is being conducted.
Categories
- Windows
- Endpoint
Data Sources
- File
Created: 2022-07-30