Abusable DLL Potential Sideloading From Suspicious Location

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects potential DLL sideloading of DLLs that are known to be abused from suspicious locations

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "sa_imageloaded" AND OBJECTNAME endswith "\coreclr.dll,\facesdk.dll,\HPCustPartUI.dll,\libcef.dll,\ZIPDLL.dll" AND (OBJECTNAME contains ":\Perflogs\,:\Users\Public\,\Temporary Internet,\Windows\Temp" OR ((OBJECTNAME contains ":\Users" AND OBJECTNAME contains "\Favorites") OR (OBJECTNAME contains ":\Users" AND OBJECTNAME contains "\Favourites") OR (OBJECTNAME contains ":\Users" AND OBJECTNAME contains "\Contacts") OR (OBJECTNAME contains ":\Users" AND OBJECTNAME contains "\Pictures"))) select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.PRODUCT_NAME,Action1.OBJECTNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

X__Junior (Nextron Systems)