Loaded Module Enumeration Via Tasklist.EXE

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects the enumeration of a specific DLL or EXE being used by a binary via "tasklist.exe". This is often used by attackers in order to find the specific process identifier (PID) that is using the DLL in question. In order to dump the process memory or perform other nefarious actions.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND (PROCESSNAME endswith "\tasklist.exe" OR ORIGINALFILENAME = "tasklist.exe") AND COMMANDLINE contains "-m,/m,–m,—m,―m" AND COMMANDLINE contains "rdpcorets.dll" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Swachchhanda Shrawan Poudel