
Summary
This rule is designed to detect potential DLL sideloading attacks specifically targeting the ClassicExplorer32.dll file from the Classic Shell software. It identifies instances where the ClassicExplorer32.dll file is loaded in a way that does not conform to its legitimate installation path, which is typically found in 'C:\Program Files\Classic Shell\'. The detection framework checks for the loading of the DLL by observing if the image loaded ends with 'ClassicExplorer32.dll' while ensuring that it does not originate from its designated directory. This discrepancy can suggest that an attacker is misusing the DLL to execute malicious payloads while masquerading as a legitimate process, thus circumventing detection mechanisms. The detection logic employs a combination of selection and filtering conditions to accurately pinpoint instances of potential sideloading that may indicate an active session of persistence, privilege escalation, or evasion strategies employed by malware. Reference materials include articles that explain the threat landscape and specific attacks leveraging atypical actions from such DLL files, particularly focused on recent geopolitical tensions.
Categories
- Windows
- Endpoint
- Application
Data Sources
- Image
- Process
- File
Created: 2022-12-13