Potential Mpclient.DLL Sideloading Via OfflineScannerShell.EXE Execution

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects execution of Windows Defender "OfflineScannerShell.exe" from its non standard directory. The "OfflineScannerShell.exe" binary is vulnerable to DLL side loading and will load any DLL named "mpclient.dll" from the current working directory.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND (PROCESSNAME endswith "\OfflineScannerShell.exe" OR ORIGINALFILENAME = "OfflineScannerShell.exe") AND (CWD != "C:\Program Files\Windows Defender\Offline" AND CWD != "" AND isExist(CWD)) select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

frack113