Potential Wazuh Security Platform DLL Sideloading
Detects potential DLL side loading of DLLs that are part of the Wazuh security platform
Sigma rule (View on GitHub)
1title: Potential Wazuh Security Platform DLL Sideloading
2id: db77ce78-7e28-4188-9337-cf30e2b3ba9f
3status: test
4description: Detects potential DLL side loading of DLLs that are part of the Wazuh security platform
5references:
6 - https://www.trendmicro.com/en_us/research/23/c/iron-tiger-sysupdate-adds-linux-targeting.html
7author: X__Junior (Nextron Systems)
8date: 2023-03-13
9modified: 2023-05-12
10tags:
11 - attack.defense-evasion
12 - attack.persistence
13 - attack.privilege-escalation
14 - attack.t1574.001
15logsource:
16 category: image_load
17 product: windows
18detection:
19 selection:
20 ImageLoaded|endswith:
21 - '\libwazuhshared.dll'
22 - '\libwinpthread-1.dll'
23 filter_main_generic:
24 ImageLoaded|startswith:
25 - 'C:\Program Files\'
26 - 'C:\Program Files (x86)\'
27 filter_optional_mingw64:
28 # Note: Many third party apps installed in "AppData" or "ProgramData" and leverage "mingw64" make use of "libwinpthread-1.dll"
29 # In production its best to make a list of these apps and replace this filter with a specific one.
30 ImageLoaded|contains:
31 - '\AppData\Local\'
32 - '\ProgramData\'
33 ImageLoaded|endswith: '\mingw64\bin\libwinpthread-1.dll'
34 condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
35falsepositives:
36 - Many legitimate applications leverage this DLL. (Visual Studio, JetBrains, Ruby, Anaconda, GithubDesktop, etc.)
37level: medium
References
Related rules
- Creation Of Non-Existent System DLL
- DLL Search Order Hijackig Via Additional Space in Path
- DLL Sideloading Of ShellChromeAPI.DLL
- Malicious DLL File Dropped in the Teams or OneDrive Folder
- Microsoft Office DLL Sideload