Skip to content

Commit cca922a

Browse files
committed
feat(rules): DLL Side-Loading via Microsoft Office dropped file
Identifies Microsoft Office process creating a DLL or other variant of an executable object which is later loaded by a trusted binary. Adversaries may exploit this behavior by delivering malicious modules via Microsoft Office documents.
1 parent 78c98cf commit cca922a

File tree

1 file changed

+39
-0
lines changed

1 file changed

+39
-0
lines changed
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
name: DLL Side-Loading via Microsoft Office dropped file
2+
id: d808175d-c4f8-459d-b17f-ca9a88890c04
3+
version: 1.0.0
4+
description: |
5+
Identifies Microsoft Office process creating a DLL or other variant of an executable object which
6+
is later loaded by a trusted binary. Adversaries may exploit this behavior by delivering malicious
7+
modules via Microsoft Office documents.
8+
labels:
9+
tactic.id: TA0005
10+
tactic.name: Defense Evasion
11+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
12+
technique.id: T1574
13+
technique.name: Hijack Execution Flow
14+
technique.ref: https://attack.mitre.org/techniques/T1574/
15+
subtechnique.id: T1574.002
16+
subtechnique.name: DLL Side-Loading
17+
subtechnique.ref: https://attack.mitre.org/techniques/T1574/002/
18+
19+
condition: >
20+
sequence
21+
maxspan 6m
22+
|create_file and (file.extension iin ('.dll', '.cpl', '.ocx') or file.is_dll) and ps.name iin msoffice_binaries| by file.path
23+
|(load_unsigned_or_untrusted_dll) and pe.is_signed = true and ps.name not iin msoffice_binaries
24+
and
25+
image.path not imatches '?:\\Windows\\assembly\\NativeImages_*'
26+
and
27+
ps.exe not imatches
28+
(
29+
'?:\\Windows\\System32\\msiexec.exe',
30+
'?:\\Windows\\SysWOW64\\msiexec.exe',
31+
'?:\\Windows\\System32\\spoolsv.exe'
32+
)
33+
| by image.path
34+
35+
output: >
36+
Suspicious DLL %1.file.path dropped by Microsoft Office process %1.ps.exe and subsequently loaded by process %2.ps.exe
37+
severity: high
38+
39+
min-engine-version: 2.4.0

0 commit comments

Comments
 (0)