Potential DLL Sideloading Via JsSchHlp
Detects potential DLL sideloading using JUSTSYSTEMS Japanese word processor
Sigma rule (View on GitHub)
1title: Potential DLL Sideloading Via JsSchHlp
2id: 68654bf0-4412-43d5-bfe8-5eaa393cd939
3status: test
4description: Detects potential DLL sideloading using JUSTSYSTEMS Japanese word processor
5references:
6 - https://www.welivesecurity.com/2022/12/14/unmasking-mirrorface-operation-liberalface-targeting-japanese-political-entities/
7 - http://www.windowexe.com/bbs/board.php?q=jsschhlp-exe-c-program-files-common-files-justsystem-jsschhlp-jsschhlp
8author: frack113
9date: 2022-12-14
10tags:
11 - attack.defense-evasion
12 - attack.persistence
13 - attack.privilege-escalation
14 - attack.t1574.001
15logsource:
16 category: image_load
17 product: windows
18detection:
19 selection:
20 ImageLoaded|endswith: '\JSESPR.dll'
21 filter:
22 ImageLoaded|startswith: 'C:\Program Files\Common Files\Justsystem\JsSchHlp\'
23 condition: selection and not filter
24falsepositives:
25 - Unknown
26level: medium
References
Related rules
- Creation Of Non-Existent System DLL
- DLL Search Order Hijackig Via Additional Space in Path
- DLL Sideloading Of ShellChromeAPI.DLL
- Malicious DLL File Dropped in the Teams or OneDrive Folder
- Microsoft Office DLL Sideload