Abusable DLL Potential Sideloading From Suspicious Location
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects potential DLL sideloading of DLLs that are known to be abused from suspicious locations
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "sa_imageloaded" AND OBJECTNAME endswith "\coreclr.dll,\facesdk.dll,\HPCustPartUI.dll,\libcef.dll,\ZIPDLL.dll" AND (OBJECTNAME contains ":\Perflogs\,:\Users\Public\,\Temporary Internet,\Windows\Temp" OR ((OBJECTNAME contains ":\Users" AND OBJECTNAME contains "\Favorites") OR (OBJECTNAME contains ":\Users" AND OBJECTNAME contains "\Favourites") OR (OBJECTNAME contains ":\Users" AND OBJECTNAME contains "\Contacts") OR (OBJECTNAME contains ":\Users" AND OBJECTNAME contains "\Pictures"))) select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.PRODUCT_NAME,Action1.OBJECTNAME
Detection
Execution Mode
realtime
Log Sources
Windows
Author
X__Junior (Nextron Systems)


