Trusted Path Bypass via Windows Directory Spoofing

Last updated on:

In this page

About the rule

Rule Type

Standard

Rule Description

Detects DLLs loading from a spoofed Windows directory path with an extra space (e.g "C:\Windows \System32") which can bypass Windows trusted path verification.

Severity

Critical

Detection

Execution Mode

realtime

Log Sources

Windows

Author

@Swachchhanda Shrawan Poudel (Nextron Systems)