Unsigned Binary Loaded From Suspicious Location

Detects Code Integrity (CI) engine blocking processes from loading unsigned DLLs residing in suspicious locations

Sigma rule (View on GitHub)

 1title: Unsigned Binary Loaded From Suspicious Location
 2id: 8289bf8c-4aca-4f5a-9db3-dc3d7afe5c10
 3status: test
 4description: Detects Code Integrity (CI) engine blocking processes from loading unsigned DLLs residing in suspicious locations
 5references:
 6    - https://github.com/nasbench/EVTX-ETW-Resources/blob/45fd5be71a51aa518b1b36d4e1f36af498084e27/ETWEventsList/CSV/Windows11/21H2/W11_21H2_Pro_20220719_22000.795/Providers/Microsoft-Windows-Security-Mitigations.csv
 7author: Nasreddine Bencherchali (Nextron Systems)
 8date: 2022/08/03
 9modified: 2022/09/28
10tags:
11    - attack.defense_evasion
12    - attack.t1574.002
13logsource:
14    product: windows
15    service: security-mitigations
16detection:
17    selection:
18        EventID:
19            - 11
20            - 12
21        ImageName|contains:
22            - '\Users\Public\'
23            - '\PerfLogs\'
24            - '\Desktop\'
25            - '\Downloads\'
26            - '\AppData\Local\Temp\'
27            - 'C:\Windows\TEMP\'
28    condition: selection
29falsepositives:
30    - Unknown
31level: high

References

Related rules

to-top