Unsigned Binary Loaded From Suspicious Location

Detects Code Integrity (CI) engine blocking processes from loading unsigned DLLs residing in suspicious locations

Sigma rule (View on GitHub)

 1title: Unsigned Binary Loaded From Suspicious Location
 2id: 8289bf8c-4aca-4f5a-9db3-dc3d7afe5c10
 3status: test
 4description: Detects Code Integrity (CI) engine blocking processes from loading unsigned DLLs residing in suspicious locations
 5references:
 6    - https://github.com/nasbench/EVTX-ETW-Resources/blob/45fd5be71a51aa518b1b36d4e1f36af498084e27/ETWEventsList/CSV/Windows11/21H2/W11_21H2_Pro_20220719_22000.795/Providers/Microsoft-Windows-Security-Mitigations.csv
 7author: Nasreddine Bencherchali (Nextron Systems)
 8date: 2022-08-03
 9modified: 2022-09-28
10tags:
11    - attack.privilege-escalation
12    - attack.persistence
13    - attack.defense-evasion
14    - attack.t1574.001
15logsource:
16    product: windows
17    service: security-mitigations
18detection:
19    selection:
20        EventID:
21            - 11
22            - 12
23        ImageName|contains:
24            - '\Users\Public\'
25            - '\PerfLogs\'
26            - '\Desktop\'
27            - '\Downloads\'
28            - '\AppData\Local\Temp\'
29            - 'C:\Windows\TEMP\'
30    condition: selection
31falsepositives:
32    - Unknown
33level: high

References

Related rules

to-top