ec827cccb6
Co-authored-by: nasbench <nasbench@users.noreply.github.com>
27 lines
894 B
YAML
27 lines
894 B
YAML
title: Potential DLL Sideloading Of MpSvc.DLL
|
|
id: 5ba243e5-8165-4cf7-8c69-e1d3669654c1
|
|
status: test
|
|
description: Detects potential DLL sideloading of "MpSvc.dll".
|
|
references:
|
|
- https://hijacklibs.net/entries/microsoft/built-in/mpsvc.html
|
|
author: Nasreddine Bencherchali (Nextron Systems), Wietze Beukema
|
|
date: 2024-07-11
|
|
tags:
|
|
- attack.defense-evasion
|
|
- attack.t1574.001
|
|
logsource:
|
|
product: windows
|
|
category: image_load
|
|
detection:
|
|
selection:
|
|
ImageLoaded|endswith: '\MpSvc.dll'
|
|
filter_main_generic:
|
|
ImageLoaded|startswith:
|
|
- 'C:\Program Files\Windows Defender\'
|
|
- 'C:\ProgramData\Microsoft\Windows Defender\Platform\'
|
|
- 'C:\Windows\WinSxS\'
|
|
condition: selection and not 1 of filter_main_*
|
|
falsepositives:
|
|
- Legitimate applications loading their own versions of the DLL mentioned in this rule.
|
|
level: medium
|