
Summary
This detection rule is designed to identify instances of DLL sideloading involving the non-existent ShellChromeAPI.DLL. Adversaries may use legitimate system binaries, particularly the DeviceEnroller.exe, to launch their malicious DLLs by manipulating commands or arguments, as seen with the PhoneDeepLink flag. The detection is triggered when a process attempts to load a DLL that does not exist in the system, specifically targeting the DLL path that ends with \ShellChromeAPI.dll. This behavior is often indicative of tactics used for evading detection, maintaining persistence, or escalating privileges within a compromised environment.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Image
Created: 2022-12-01