UAC Bypass With Fake DLL
Attempts to load dismcore.dll after dropping it
Sigma rule (View on GitHub)
1title: UAC Bypass With Fake DLL
2id: a5ea83a7-05a5-44c1-be2e-addccbbd8c03
3status: test
4description: Attempts to load dismcore.dll after dropping it
5references:
6 - https://steemit.com/utopian-io/@ah101/uac-bypassing-utility
7author: oscd.community, Dmitry Uchakin
8date: 2020-10-06
9modified: 2022-12-25
10tags:
11 - attack.persistence
12 - attack.defense-evasion
13 - attack.privilege-escalation
14 - attack.t1548.002
15 - attack.t1574.002
16logsource:
17 category: image_load
18 product: windows
19detection:
20 selection:
21 Image|endswith: '\dism.exe'
22 ImageLoaded|endswith: '\dismcore.dll'
23 filter:
24 ImageLoaded: 'C:\Windows\System32\Dism\dismcore.dll'
25 condition: selection and not filter
26falsepositives:
27 - Actions of a legitimate telnet client
28level: high
References
Related rules
- Creation Of Non-Existent System DLL
- DLL Search Order Hijackig Via Additional Space in Path
- DLL Sideloading Of ShellChromeAPI.DLL
- Malicious DLL File Dropped in the Teams or OneDrive Folder
- Microsoft Office DLL Sideload