Unsigned Binary Loaded From Suspicious Location
Detects Code Integrity (CI) engine blocking processes from loading unsigned DLLs residing in suspicious locations
Sigma rule (View on GitHub)
1title: Unsigned Binary Loaded From Suspicious Location
2id: 8289bf8c-4aca-4f5a-9db3-dc3d7afe5c10
3status: test
4description: Detects Code Integrity (CI) engine blocking processes from loading unsigned DLLs residing in suspicious locations
5references:
6 - https://github.com/nasbench/EVTX-ETW-Resources/blob/45fd5be71a51aa518b1b36d4e1f36af498084e27/ETWEventsList/CSV/Windows11/21H2/W11_21H2_Pro_20220719_22000.795/Providers/Microsoft-Windows-Security-Mitigations.csv
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2022-08-03
9modified: 2022-09-28
10tags:
11 - attack.privilege-escalation
12 - attack.persistence
13 - attack.defense-evasion
14 - attack.t1574.001
15logsource:
16 product: windows
17 service: security-mitigations
18detection:
19 selection:
20 EventID:
21 - 11
22 - 12
23 ImageName|contains:
24 - '\Users\Public\'
25 - '\PerfLogs\'
26 - '\Desktop\'
27 - '\Downloads\'
28 - '\AppData\Local\Temp\'
29 - 'C:\Windows\TEMP\'
30 condition: selection
31falsepositives:
32 - Unknown
33level: high
References
Related rules
- APT27 - Emissary Panda Activity
- Aruba Network Service Potential DLL Sideloading
- Creation of WerFault.exe/Wer.dll in Unusual Folder
- DHCP Callout DLL Installation
- DHCP Server Error Failed Loading the CallOut DLL