Potential DLL Sideloading Of DbgModel.DLL

Detects potential DLL sideloading of "DbgModel.dll"

Sigma rule (View on GitHub)

 1title: Potential DLL Sideloading Of DbgModel.DLL
 2id: fef394cd-f44d-4040-9b18-95d92fe278c0
 3status: experimental
 4description: Detects potential DLL sideloading of "DbgModel.dll"
 5references:
 6    - https://hijacklibs.net/entries/microsoft/built-in/dbgmodel.html
 7author: Gary Lobermier
 8date: 2024/07/11
 9tags:
10    - attack.defense_evasion
11    - attack.t1574.002
12logsource:
13    product: windows
14    category: image_load
15detection:
16    selection:
17        ImageLoaded|endswith: '\dbgmodel.dll'
18    filter_main_generic:
19        ImageLoaded|startswith:
20            - 'C:\Windows\System32\'
21            - 'C:\Windows\SysWOW64\'
22            - 'C:\Windows\WinSxS\'
23    filter_main_optional_windbg:
24        ImageLoaded|startswith: 'C:\Program Files\WindowsApps\Microsoft.WinDbg_'
25    filter_main_optional_windows_kits:
26        ImageLoaded|startswith:
27            - 'C:\Program Files (x86)\Windows Kits\'
28            - 'C:\Program Files\Windows Kits\'
29    condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
30falsepositives:
31    - Legitimate applications loading their own versions of the DLL mentioned in this rule
32level: medium

References

Related rules

to-top