Potential DLL Sideloading Via JsSchHlp
Detects potential DLL sideloading using JUSTSYSTEMS Japanese word processor
Sigma rule (View on GitHub)
1title: Potential DLL Sideloading Via JsSchHlp
2id: 68654bf0-4412-43d5-bfe8-5eaa393cd939
3status: test
4description: Detects potential DLL sideloading using JUSTSYSTEMS Japanese word processor
5references:
6 - https://www.welivesecurity.com/2022/12/14/unmasking-mirrorface-operation-liberalface-targeting-japanese-political-entities/
7 - http://www.windowexe.com/bbs/board.php?q=jsschhlp-exe-c-program-files-common-files-justsystem-jsschhlp-jsschhlp
8author: frack113
9date: 2022-12-14
10tags:
11 - attack.defense-evasion
12 - attack.persistence
13 - attack.privilege-escalation
14 - attack.t1574.001
15 - attack.t1574.002
16logsource:
17 category: image_load
18 product: windows
19detection:
20 selection:
21 ImageLoaded|endswith: '\JSESPR.dll'
22 filter:
23 ImageLoaded|startswith: 'C:\Program Files\Common Files\Justsystem\JsSchHlp\'
24 condition: selection and not filter
25falsepositives:
26 - Unknown
27level: medium
References
Related rules
- Creation Of Non-Existent System DLL
- DLL Sideloading Of ShellChromeAPI.DLL
- Microsoft Office DLL Sideload
- Potential 7za.DLL Sideloading
- Potential Antivirus Software DLL Sideloading