Execution DLL of Choice Using WAB.EXE
This rule detects that the path to the DLL written in the registry is different from the default one. Launched WAB.exe tries to load the DLL from Registry.
Sigma rule (View on GitHub)
1title: Execution DLL of Choice Using WAB.EXE
2id: fc014922-5def-4da9-a0fc-28c973f41bfb
3status: test
4description: This rule detects that the path to the DLL written in the registry is different from the default one. Launched WAB.exe tries to load the DLL from Registry.
5references:
6 - https://github.com/LOLBAS-Project/LOLBAS/blob/8283d8d91552213ded165fd36deb6cb9534cb443/yml/OSBinaries/Wab.yml
7 - https://twitter.com/Hexacorn/status/991447379864932352
8 - http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/
9author: oscd.community, Natalia Shornikova
10date: 2020-10-13
11modified: 2023-08-17
12tags:
13 - attack.defense-evasion
14 - attack.t1218
15logsource:
16 category: registry_set
17 product: windows
18detection:
19 selection:
20 TargetObject|endswith: '\Software\Microsoft\WAB\DLLPath'
21 filter:
22 Details: '%CommonProgramFiles%\System\wab32.dll'
23 condition: selection and not filter
24falsepositives:
25 - Unknown
26level: high
References
Related rules
- Abusing Print Executable
- AddinUtil.EXE Execution From Uncommon Directory
- AgentExecutor PowerShell Execution
- Arbitrary DLL or Csproj Code Execution Via Dotnet.EXE
- Arbitrary File Download Via MSOHTMED.EXE