Potential DLL Sideloading Of Non-Existent DLLs From System Folders

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects DLL sideloading of system DLLs that are not present on the system by default (at least not in system directories). Usually this technique is used to achieve UAC bypass or privilege escalation.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "sa_imageloaded" AND OBJECTNAME endswith ":\Windows\System32\TSMSISrv.dll,:\Windows\System32\TSVIPSrv.dll,:\Windows\System32\wbem\wbemcomn.dll,:\Windows\System32\WLBSCTRL.dll,:\Windows\System32\wow64log.dll,:\Windows\System32\WptsExtensions.dll" AND (SIGNED != "true" OR SIGNATURESTATUS != "Valid" OR SIGNATURE != "Microsoft Windows") select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.PRODUCT_NAME,Action1.OBJECTNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Nasreddine Bencherchali (Nextron Systems), SBousseaden