Potential SmadHook.DLL Sideloading
Detects potential DLL sideloading of "SmadHook.dll", a DLL used by SmadAV antivirus
Sigma rule (View on GitHub)
1title: Potential SmadHook.DLL Sideloading
2id: 24b6cf51-6122-469e-861a-22974e9c1e5b
3status: test
4description: Detects potential DLL sideloading of "SmadHook.dll", a DLL used by SmadAV antivirus
5references:
6 - https://research.checkpoint.com/2023/malware-spotlight-camaro-dragons-tinynote-backdoor/
7 - https://www.qurium.org/alerts/targeted-malware-against-crph/
8author: X__Junior (Nextron Systems)
9date: 2023-06-01
10tags:
11 - attack.defense-evasion
12 - attack.privilege-escalation
13 - attack.t1574.001
14logsource:
15 category: image_load
16 product: windows
17detection:
18 selection:
19 ImageLoaded|endswith:
20 - '\SmadHook32c.dll'
21 - '\SmadHook64c.dll'
22 filter_main_legit_path:
23 Image:
24 - 'C:\Program Files (x86)\SMADAV\SmadavProtect32.exe'
25 - 'C:\Program Files (x86)\SMADAV\SmadavProtect64.exe'
26 - 'C:\Program Files\SMADAV\SmadavProtect32.exe'
27 - 'C:\Program Files\SMADAV\SmadavProtect64.exe'
28 ImageLoaded|startswith:
29 - 'C:\Program Files (x86)\SMADAV\'
30 - 'C:\Program Files\SMADAV\'
31 condition: selection and not 1 of filter_main_*
32falsepositives:
33 - Unlikely
34level: high
References
Related rules
- Creation Of Non-Existent System DLL
- DLL Search Order Hijackig Via Additional Space in Path
- DLL Sideloading Of ShellChromeAPI.DLL
- Lazarus APT DLL Sideloading Activity
- Malicious DLL File Dropped in the Teams or OneDrive Folder