Lazarus APT DLL Sideloading Activity

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects sideloading of trojanized DLLs used in Lazarus APT campaign in the case of a Spanish aerospace company

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "sa_imageloaded" AND (PROCESSNAME = "C:\ProgramShared\PresentationHost.exe" AND OBJECTNAME = ":\ProgramShared\mscoree.dll") OR (PROCESSNAME = "C:\ProgramData\Adobe\colorcpl.exe" AND OBJECTNAME = "C:\ProgramData\Adobe\colorui.dll") OR (PROCESSNAME = "C:\ProgramData\Oracle\Java\fixmapi.exe" AND OBJECTNAME = "C:\ProgramData\Oracle\Java\mapistub.dll") OR (PROCESSNAME = "C:\ProgramData\Adobe\ARM\tabcal.exe" AND OBJECTNAME = "C:\ProgramData\Adobe\ARM\HID.dll") select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.PRODUCT_NAME,Action1.OBJECTNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Thurein Oo, Nasreddine Bencherchali (Nextron Systems)