Files
blue-team-tools/rules/windows/image_load/image_load_side_load_scm.yml
T
2022-12-02 23:16:03 +01:00

30 lines
978 B
YAML

title: SCM DLL Sideload
id: bc3cc333-48b9-467a-9d1f-d44ee594ef48
status: experimental
description: Detects DLL sideloading of DLLs that are loaded by the SCM for some services (IKE, IKEEXT, SessionEnv) which do not exists on a typical modern system
references:
- https://decoded.avast.io/martinchlumecky/png-steganography/
- https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
author: Nasreddine Bencherchali
date: 2022/12/01
tags:
- attack.defense_evasion
- attack.persistence
- attack.privilege_escalation
- attack.t1574.001
- attack.t1574.002
logsource:
category: image_load
product: windows
detection:
selection:
ImageLoaded:
- 'C:\Windows\System32\WLBSCTRL.dll'
- 'C:\Windows\System32\TSMSISrv.dll'
- 'C:\Windows\System32\TSVIPSrv.dll'
Image: 'C:\Windows\System32\svchost.exe'
condition: selection
falsepositives:
- Unknown
level: medium