Unsigned Binary Loaded From Suspicious Location
Detects Code Integrity (CI) engine blocking processes from loading unsigned DLLs residing in suspicious locations
Sigma rule (View on GitHub)
1title: Unsigned Binary Loaded From Suspicious Location
2id: 8289bf8c-4aca-4f5a-9db3-dc3d7afe5c10
3status: test
4description: Detects Code Integrity (CI) engine blocking processes from loading unsigned DLLs residing in suspicious locations
5references:
6 - https://github.com/nasbench/EVTX-ETW-Resources/blob/45fd5be71a51aa518b1b36d4e1f36af498084e27/ETWEventsList/CSV/Windows11/21H2/W11_21H2_Pro_20220719_22000.795/Providers/Microsoft-Windows-Security-Mitigations.csv
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2022-08-03
9modified: 2022-09-28
10tags:
11 - attack.defense-evasion
12 - attack.t1574.002
13logsource:
14 product: windows
15 service: security-mitigations
16detection:
17 selection:
18 EventID:
19 - 11
20 - 12
21 ImageName|contains:
22 - '\Users\Public\'
23 - '\PerfLogs\'
24 - '\Desktop\'
25 - '\Downloads\'
26 - '\AppData\Local\Temp\'
27 - 'C:\Windows\TEMP\'
28 condition: selection
29falsepositives:
30 - Unknown
31level: high
References
Related rules
- APT27 - Emissary Panda Activity
- Creation Of Non-Existent System DLL
- DHCP Callout DLL Installation
- DHCP Server Error Failed Loading the CallOut DLL
- DHCP Server Loaded the CallOut DLL