DLL Names Used By SVR For GraphicalProton Backdoor

Hunts known SVR-specific DLL names.

Sigma rule (View on GitHub)

 1title: DLL Names Used By SVR For GraphicalProton Backdoor
 2id: e64c8ef3-9f98-40c8-b71e-96110991cb4c
 3status: test
 4description: Hunts known SVR-specific DLL names.
 5references:
 6    - https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-347a
 7author: CISA
 8date: 2023-12-18
 9tags:
10    - attack.persistence
11    - attack.privilege-escalation
12    - attack.execution
13    - attack.stealth
14    - attack.t1574.001
15    - detection.emerging-threats
16logsource:
17    category: image_load
18    product: windows
19detection:
20    selection:
21        ImageLoaded|endswith:
22            - '\AclNumsInvertHost.dll'
23            - '\AddressResourcesSpec.dll'
24            - '\BlendMonitorStringBuild.dll'
25            - '\ChildPaletteConnected.dll'
26            - '\DeregisterSeekUsers.dll'
27            - '\HandleFrequencyAll.dll'
28            - '\HardSwapColor.dll'
29            - '\LengthInMemoryActivate.dll'
30            - '\ModeBitmapNumericAnimate.dll'
31            - '\ModeFolderSignMove.dll'
32            - '\ParametersNamesPopup.dll'
33            - '\PerformanceCaptionApi.dll'
34            - '\ScrollbarHandleGet.dll'
35            - '\UnregisterAncestorAppendAuto.dll'
36            - '\WowIcmpRemoveReg.dll'
37    condition: selection
38falsepositives:
39    - Unknown
40level: medium

References

Related rules

to-top