Lazarus APT DLL Sideloading Activity
Detects sideloading of trojanized DLLs used in Lazarus APT campaign in the case of a Spanish aerospace company
Sigma rule (View on GitHub)
1title: Lazarus APT DLL Sideloading Activity
2id: 24007168-a26b-4049-90d0-ce138e13a5cf
3status: test
4description: Detects sideloading of trojanized DLLs used in Lazarus APT campaign in the case of a Spanish aerospace company
5references:
6 - https://www.welivesecurity.com/en/eset-research/lazarus-luring-employees-trojanized-coding-challenges-case-spanish-aerospace-company/
7 - https://www.bleepingcomputer.com/news/security/lazarus-hackers-breach-aerospace-firm-with-new-lightlesscan-malware/
8author: Thurein Oo, Nasreddine Bencherchali (Nextron Systems)
9date: 2023-10-18
10tags:
11 - attack.defense-evasion
12 - attack.privilege-escalation
13 - attack.t1574.001
14 - attack.g0032
15 - detection.emerging-threats
16logsource:
17 product: windows
18 category: image_load
19detection:
20 selection_mscoree:
21 Image: 'C:\ProgramShared\PresentationHost.exe'
22 ImageLoaded: ':\ProgramShared\mscoree.dll'
23 selection_colorui:
24 Image: 'C:\ProgramData\Adobe\colorcpl.exe'
25 ImageLoaded: 'C:\ProgramData\Adobe\colorui.dll'
26 selection_mapistub:
27 Image: 'C:\ProgramData\Oracle\Java\fixmapi.exe'
28 ImageLoaded: 'C:\ProgramData\Oracle\Java\mapistub.dll'
29 selection_hid:
30 Image: 'C:\ProgramData\Adobe\ARM\tabcal.exe'
31 ImageLoaded: 'C:\ProgramData\Adobe\ARM\HID.dll'
32 condition: 1 of selection_*
33falsepositives:
34 - Unlikely
35level: high
References
Related rules
- APT27 - Emissary Panda Activity
- Creation Of Non-Existent System DLL
- DLL Names Used By SVR For GraphicalProton Backdoor
- DLL Search Order Hijackig Via Additional Space in Path
- DLL Sideloading Of ShellChromeAPI.DLL