34c5d66c22
chore: update mitre tags to use attack v19
30 lines
907 B
YAML
30 lines
907 B
YAML
title: VMGuestLib DLL Sideload
|
|
id: 70e8e9b4-6a93-4cb7-8cde-da69502e7aff
|
|
status: test
|
|
description: Detects DLL sideloading of VMGuestLib.dll by the WmiApSrv service.
|
|
references:
|
|
- https://decoded.avast.io/martinchlumecky/png-steganography/
|
|
author: Nasreddine Bencherchali (Nextron Systems)
|
|
date: 2022-12-01
|
|
tags:
|
|
- attack.persistence
|
|
- attack.privilege-escalation
|
|
- attack.execution
|
|
- attack.stealth
|
|
- attack.t1574.001
|
|
logsource:
|
|
category: image_load
|
|
product: windows
|
|
detection:
|
|
selection:
|
|
ImageLoaded|contains|all:
|
|
- '\VMware\VMware Tools\vmStatsProvider\win32'
|
|
- '\vmGuestLib.dll'
|
|
Image|endswith: '\Windows\System32\wbem\WmiApSrv.exe'
|
|
filter:
|
|
Signed: 'true'
|
|
condition: selection and not filter
|
|
falsepositives:
|
|
- FP could occur if the legitimate version of vmGuestLib already exists on the system
|
|
level: medium
|