
Summary
This detection rule identifies the loading of 'EvtMuteHook.dll', which is a crucial part of the SharpEvtHook toolkit. This toolkit is known for its capability to manipulate Windows event logs, a common tactic employed by attackers to obscure their activities and evade detection measures. The rule operates under the Windows operating environment, focusing on detecting anomalies in DLL loading activities, specifically targeting malicious DLLs that engage in stealth techniques. By monitoring for the specific hash 'IMPHASH=330768A4F172E10ACB6287B87289D83B', it aims to provide an alert whenever this potentially harmful library is loaded into memory. Given that other legitimate DLLs may share the same import hash, false positives can occur if those are encountered during routine operations. Therefore, while the risk level is marked as high due to the implications of using such a tool, careful analysis is recommended when responding to alerts generated by this rule.
Categories
- Windows
- Endpoint
Data Sources
- Image
Created: 2022-09-07