Title : DLL Names Used By SVR For GraphicalProton Backdoor
Rule id : e64c8ef3-9f98-40c8-b71e-96110991cb4c
Url | |
---|---|
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-347a | pdf/fdb7d0ff551e0a230e54c9ef703be38a74c09f811057193bb2ab0ac21dee22cd.pdf |
Title : Diamond Sleet APT DLL Sideloading Indicators
Rule id : d1b65d98-37d7-4ff6-b139-2d87c1af3042
Title : Lazarus APT DLL Sideloading Activity
Rule id : 24007168-a26b-4049-90d0-ce138e13a5cf
Title : DLL Loaded From Suspicious Location Via Cmspt.EXE
Rule id : 75e508f7-932d-4ebc-af77-269237a84ce1
Title : Amsi.DLL Loaded Via LOLBIN Process
Rule id : 6ec86d9e-912e-4726-91a2-209359b999b9
Url | |
---|---|
https://www.paloaltonetworks.com/blog/security-operations/stopping-powershell-without-powershell/ | pdf/66f2ab6c9bc31a74087d677bbc3a0f0dd16b92f244d3e7c010cd9f1555c3f38e.pdf |
Title : Amsi.DLL Load By Uncommon Process
Rule id : facd1549-e416-48e0-b8c4-41d7215eedc8
Title : Potential Azure Browser SSO Abuse
Rule id : 50f852e6-af22-4c78-9ede-42ef36aa3453
Title : Suspicious Renamed Comsvcs DLL Loaded By Rundll32
Rule id : 8cde342c-ba48-4b74-b615-172c330f2e93
Url | |
---|---|
https://twitter.com/sbousseaden/status/1555200155351228419 | pdf/039ef258fe01ee935eb95fb25342eaae63171983dc266aa2edd91cbe4807bb1c.pdf |
Title : CredUI.DLL Loaded By Uncommon Process
Rule id : 9ae01559-cf7e-4f8e-8e14-4c290a1b4784
Title : Dbghelp/Dbgcore DLL Loaded By Uncommon/Suspicious Process
Rule id : 0e277796-5f23-4e49-a490-483131d4f6e1
Title : Suspicious Unsigned Dbghelp/Dbgcore DLL Loaded
Rule id : bdc64095-d59a-42a2-8588-71fd9c9d9abc
Title : PCRE.NET Package Image Load
Rule id : 84b0a8f3-680b-4096-a45b-e9a89221727c
Title : Load Of RstrtMgr.DLL By A Suspicious Process
Rule id : b48492dc-c5ef-4572-8dff-32bc241c15c8
Title : Load Of RstrtMgr.DLL By An Uncommon Process
Rule id : 3669afd2-9891-4534-a626-e5cf03810a61
Title : Diagnostic Library Sdiageng.DLL Loaded By Msdt.EXE
Rule id : ec8c4047-fad9-416a-8c81-0f479353d7f6
Url | |
---|---|
https://www.securonix.com/blog/detecting-microsoft-msdt-dogwalk/ | pdf/2db00398d48e3bbd33f77c05dfb6333b0041432ce24c22d8bd344b56b7823394.pdf |
Title : System Drawing DLL Load
Rule id : 666ecfc7-229d-42b8-821e-1a8f8cb7057c
Title : PowerShell Core DLL Loaded By Non PowerShell Process
Rule id : 092bc4b9-3d1d-43b4-a6b4-8c8acd83522f
Title : Task Scheduler DLL Loaded By Application Located In Potentially Suspicious Location
Rule id : 3b92a1d0-8d4b-4d28-a1b4-1e29d49a6a3e
Title : Time Travel Debugging Utility Usage - Image
Rule id : e76c8240-d68f-4773-8880-5c6f63595aaf
Title : Suspicious Volume Shadow Copy VSS_PS.dll Load
Rule id : 333cdbe8-27bb-4246-bf82-b41a0dca4b70
Title : Suspicious Volume Shadow Copy Vssapi.dll Load
Rule id : 37774c23-25a1-4adb-bb6d-8bb9fd59c0f8
Url | |
---|---|
https://github.com/ORCx41/DeleteShadowCopies | pdf/65a56532408657cc5c10f91d48bfe0718eaf4aace6ca638a1e3da425949de2da.pdf |
Title : Suspicious Volume Shadow Copy Vsstrace.dll Load
Rule id : 48bfd177-7cf2-412b-ad77-baf923489e82
Url | |
---|---|
https://github.com/ORCx41/DeleteShadowCopies | pdf/65a56532408657cc5c10f91d48bfe0718eaf4aace6ca638a1e3da425949de2da.pdf |
Title : HackTool - SharpEvtMute DLL Load
Rule id : 49329257-089d-46e6-af37-4afce4290685
Url | |
---|---|
https://github.com/bats3c/EvtMute | pdf/65df42c300f188e398def64f341a5765597707fcb83749e667f7d0a0f7d856f7.pdf |
Title : HackTool - SILENTTRINITY Stager DLL Load
Rule id : 75c505b1-711d-4f68-a357-8c3fe37dbf2d
Url | |
---|---|
https://github.com/byt3bl33d3r/SILENTTRINITY | pdf/1f99df34d0b4bc7209b3ade108b7a4b7ea18a707f0b1cceddff7715f160ecb59.pdf |
Title : Potential DCOM InternetExplorer.Application DLL Hijack - Image Load
Rule id : f354eba5-623b-450f-b073-0b5b2773b6aa
Url | |
---|---|
https://threathunterplaybook.com/hunts/windows/201009-RemoteDCOMIErtUtilDLLHijack/notebook.html | pdf/ba965214af2505144a26f6c901814ff29d26160ee8671d7a6cfe913b06bcc0e8.pdf |
Title : Unsigned Image Loaded Into LSASS Process
Rule id : 857c8db3-c89b-42fb-882b-f681c7cf4da2
Url | |
---|---|
https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment | pdf/52e26c81a11e8750dcb450054f7519ab7fa64b2a0e94d3c66075f12ea424e9d0.pdf |
Title : Malicious DLL Load By Compromised 3CXDesktopApp
Rule id : d0b65ad3-e945-435e-a7a9-438e62dd48e9
Url | |
---|---|
https://www.microsoft.com/security/blog/2021/09/27/foggyweb-targeted-nobelium-malware-leads-to-persistent-backdoor/ | pdf/2e02166e72ac71f707f8e87583ea39b31031454c7f136a9e2854d7c460105481.pdf |
Title : Potential COLDSTEEL Persistence Service DLL Load
Rule id : 1d7a57da-02e0-4f7f-92b1-c7b486ccfed5
Url |
---|
Title : Potential CSharp Streamer RAT Loading .NET Executable Image
Rule id : 6f6afac3-8e7a-4e4b-9588-2608ffe08f82
Title : FoggyWeb Backdoor DLL Loading
Rule id : 640dc51c-7713-4faa-8a0e-e7c0d9d4654c
Url | |
---|---|
https://www.microsoft.com/security/blog/2021/09/27/foggyweb-targeted-nobelium-malware-leads-to-persistent-backdoor/ | pdf/2e02166e72ac71f707f8e87583ea39b31031454c7f136a9e2854d7c460105481.pdf |
Title : Kapeka Backdoor Loaded Via Rundll32.EXE
Rule id : a7e6b1f9-8d2c-4f1e-9a7d-63e4c8a2bf4c
Title : Pingback Backdoor DLL Loading Activity
Rule id : 35a7dc42-bc6f-46e0-9f83-81f8e56c8d4b
Title : Potential Raspberry Robin Aclui Dll SideLoading
Rule id : 0f3a9db2-c17a-480e-a723-d1f1c547ab6a
Title : DotNET Assembly DLL Loaded Via Office Application
Rule id : ff0f2b05-09db-4095-b96d-1b75ca24894a
Url | |
---|---|
https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16 | pdf/6ed3764048f99b1682fe836c77791f9871000daa59b8a7c748a4dd0bc18d6560.pdf |
Title : CLR DLL Loaded Via Office Applications
Rule id : d13c43f0-f66b-4279-8b2c-5912077c1780
Url | |
---|---|
https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16 | pdf/6ed3764048f99b1682fe836c77791f9871000daa59b8a7c748a4dd0bc18d6560.pdf |
Title : GAC DLL Loaded Via Office Applications
Rule id : 90217a70-13fc-48e4-b3db-0d836c5824ac
Url | |
---|---|
https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16 | pdf/6ed3764048f99b1682fe836c77791f9871000daa59b8a7c748a4dd0bc18d6560.pdf |
Title : Active Directory Parsing DLL Loaded Via Office Application
Rule id : a2a3b925-7bb0-433b-b508-db9003263cc4
Url | |
---|---|
https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16 | pdf/6ed3764048f99b1682fe836c77791f9871000daa59b8a7c748a4dd0bc18d6560.pdf |
Title : Microsoft Excel Add-In Loaded
Rule id : c5f4b5cb-4c25-4249-ba91-aa03626e3185
Url | |
---|---|
https://www.mandiant.com/resources/blog/lnk-between-browsers | pdf/542a8fb4745ce4cb6ded1a9ceb50ee93c7f540c1bfbe52570ebe6f57a908108d.pdf |
Title : Microsoft Excel Add-In Loaded From Uncommon Location
Rule id : af4c4609-5755-42fe-8075-4effb49f5d44
Title : Active Directory Kerberos DLL Loaded Via Office Application
Rule id : 7417e29e-c2e7-4cf6-a2e8-767228c64837
Url | |
---|---|
https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16 | pdf/6ed3764048f99b1682fe836c77791f9871000daa59b8a7c748a4dd0bc18d6560.pdf |
Title : Microsoft VBA For Outlook Addin Loaded Via Outlook
Rule id : 9a0b8719-cd3c-4f0a-90de-765a4cb3f5ed
Url | |
---|---|
https://speakerdeck.com/heirhabarov/hunting-for-persistence-via-microsoft-exchange-server-or-outlook?slide=58 | pdf/3fc9046b19de4a375b938ab32f36fc1f08dd380dc397de0c54f0c990ad17a491.pdf |
Title : PowerShell Core DLL Loaded Via Office Application
Rule id : bb2ba6fb-95d4-4a25-89fc-30bb736c021a
Url |
---|
Title : VBA DLL Loaded Via Office Application
Rule id : e6ce8457-68b1-485b-9bdd-3c2b5d679aa9
Url | |
---|---|
https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16 | pdf/6ed3764048f99b1682fe836c77791f9871000daa59b8a7c748a4dd0bc18d6560.pdf |
Title : Microsoft Word Add-In Loaded
Rule id : 1337afba-d17d-4d23-bd55-29b927603b30
Title : Remote DLL Load Via Rundll32.EXE
Rule id : f40017b3-cb2e-4335-ab5d-3babf679c1de
Url | |
---|---|
https://github.com/gabe-k/themebleed | pdf/6b4d0c83b1d12319e430b67504fb9dbcb12e6a6dcf79faec198b8960348b10b5.pdf |
Title : WMI ActiveScriptEventConsumers Activity Via Scrcons.EXE DLL Load
Rule id : b439f47d-ef52-4b29-9a2f-57d8a96cb6b8
Title : Potential 7za.DLL Sideloading
Rule id : 4f6edb78-5c21-42ab-a558-fd2a6fc1fd57
Url | |
---|---|
https://www.gov.pl/attachment/ee91f24d-3e67-436d-aa50-7fa56acf789d | pdf/77dced15b20169c33aa718a4d8cef63b667aa3c7a381cdea9b33438c59f77fd9.pdf |
Title : Abusable DLL Potential Sideloading From Suspicious Location
Rule id : 799a5f48-0ac1-4e0f-9152-71d137d48c2a
Title : Potential Antivirus Software DLL Sideloading
Rule id : 552b6b65-df37-4d3e-a258-f2fc4771ae54
Url | |
---|---|
https://hijacklibs.net/ | pdf/59e92a6cdff98649d8a6839064d8400dd8c6a2c14b889fc3750bc169ee3bc8e9.pdf |
Title : Potential appverifUI.DLL Sideloading
Rule id : ee6cea48-c5b6-4304-a332-10fc6446f484
Url | |
---|---|
https://web.archive.org/web/20220519091349/https://fatrodzianko.com/2020/02/15/dll-side-loading-appverif-exe/ | pdf/fb503fbd686e4427800c7ebf770931cec77224935fab738e0417065c228797eb.pdf |
Title : Aruba Network Service Potential DLL Sideloading
Rule id : 90ae0469-0cee-4509-b67f-e5efcef040f7
Url | |
---|---|
https://twitter.com/wdormann/status/1616581559892545537?t=XLCBO9BziGzD7Bmbt8oMEQ&s=09 | pdf/3fe2dfa063036792d247c1d0f93a8794c7aaa57574adb19ff47cb34df038645b.pdf |
Title : Potential AVKkid.DLL Sideloading
Rule id : 952ed57c-8f99-453d-aee0-53a49c22f95d
Url | |
---|---|
https://research.checkpoint.com/2023/beyond-the-horizon-traveling-the-world-on-camaro-dragons-usb-flash-drives/ | pdf/b876c49c8de9f1b48434582ecd35d217f1e569d05b1ec4fe5d1934e74c44f65e.pdf |
Title : Potential CCleanerDU.DLL Sideloading
Rule id : 1fbc0671-5596-4e17-8682-f020a0b995dc
Url | |
---|---|
https://lab52.io/blog/2344-2/ | pdf/4fed3d479c38e255380f08b6d50cbca51b321f8671a9ca94c93c48174c78c514.pdf |
Title : Potential CCleanerReactivator.DLL Sideloading
Rule id : 3735d5ac-d770-4da0-99ff-156b180bc600
Url | |
---|---|
https://lab52.io/blog/2344-2/ | pdf/4fed3d479c38e255380f08b6d50cbca51b321f8671a9ca94c93c48174c78c514.pdf |
Title : Potential Chrome Frame Helper DLL Sideloading
Rule id : 72ca7c75-bf85-45cd-aca7-255d360e423c
Url | |
---|---|
https://hijacklibs.net/entries/3rd_party/google/chrome_frame_helper.html | pdf/a2741e3b9483b2f9b20732a163d1ad73272effd2247cb6ca4e18b2522f58e22e.pdf |
Title : Potential DLL Sideloading Via ClassicExplorer32.dll
Rule id : caa02837-f659-466f-bca6-48bde2826ab4
Title : Potential DLL Sideloading Via comctl32.dll
Rule id : 6360757a-d460-456c-8b13-74cf0e60cceb
Title : Potential DLL Sideloading Using Coregen.exe
Rule id : 0fa66f66-e3f6-4a9c-93f8-4f2610b00171
Url | |
---|---|
https://lolbas-project.github.io/lolbas/OtherMSBinaries/Coregen/ | pdf/4ea081d55125f368897612bd7395845d41997393c8930f4989f63441580effbf.pdf |
Title : System Control Panel Item Loaded From Uncommon Location
Rule id : 2b140a5c-dc02-4bb8-b6b1-8bdb45714cde
Title : Potential DLL Sideloading Of DBGCORE.DLL
Rule id : 9ca2bf31-0570-44d8-a543-534c47c33ed7
Url | |
---|---|
https://hijacklibs.net/ | pdf/59e92a6cdff98649d8a6839064d8400dd8c6a2c14b889fc3750bc169ee3bc8e9.pdf |
Title : Potential DLL Sideloading Of DBGHELP.DLL
Rule id : 6414b5cd-b19d-447e-bb5e-9f03940b5784
Url | |
---|---|
https://hijacklibs.net/ | pdf/59e92a6cdff98649d8a6839064d8400dd8c6a2c14b889fc3750bc169ee3bc8e9.pdf |
Title : Potential DLL Sideloading Of DbgModel.DLL
Rule id : fef394cd-f44d-4040-9b18-95d92fe278c0
Url | |
---|---|
https://hijacklibs.net/entries/microsoft/built-in/dbgmodel.html | pdf/bbbc571a9fc725d0d331628d9c41816020d5c42012c23d43bc5039bb86f82d40.pdf |
Title : Potential EACore.DLL Sideloading
Rule id : edd3ddc3-386f-4ba5-9ada-4376b2cfa7b5
Url | |
---|---|
https://research.checkpoint.com/2023/beyond-the-horizon-traveling-the-world-on-camaro-dragons-usb-flash-drives/ | pdf/b876c49c8de9f1b48434582ecd35d217f1e569d05b1ec4fe5d1934e74c44f65e.pdf |
Title : Potential Edputil.DLL Sideloading
Rule id : e4903324-1a10-4ed3-981b-f6fe3be3a2c2
Url | |
---|---|
https://alternativeto.net/news/2023/5/cybercriminals-use-wordpad-vulnerability-to-spread-qbot-malware/ | pdf/3bcb2aa547d13737ece0620b5474e36d684361ccc0c8f439ce696eb29b25f162.pdf |
Title : Potential System DLL Sideloading From Non System Locations
Rule id : 4fc0deee-0057-4998-ab31-d24e46e0aba4
Title : Potential Goopdate.DLL Sideloading
Rule id : b6188d2f-b3c4-4d2c-a17d-9706e0851af0
Url |
---|
Title : Potential DLL Sideloading Of Libcurl.DLL Via GUP.EXE
Rule id : e49b5745-1064-4ac1-9a2e-f687bc2dd37e
Url | |
---|---|
https://labs.withsecure.com/publications/fin7-target-veeam-servers | pdf/bcf09078cb6247a3ea928d485651fa6eb873bd5ff379fe4aa907c61f6f3096aa.pdf |
Title : Potential Iviewers.DLL Sideloading
Rule id : 4c21b805-4dd7-469f-b47d-7383a8fcb437
Url | |
---|---|
https://www.secureworks.com/research/shadowpad-malware-analysis | pdf/3449cf28b1d05971d6ca3dfd88478913d4508a445fb17fed346ac4c7c20cc1f2.pdf |
Title : Potential DLL Sideloading Via JsSchHlp
Rule id : 68654bf0-4412-43d5-bfe8-5eaa393cd939
Title : Potential DLL Sideloading Of KeyScramblerIE.DLL Via KeyScrambler.EXE
Rule id : d2451be2-b582-4e15-8701-4196ac180260
Title : Potential Libvlc.DLL Sideloading
Rule id : bf9808c4-d24f-44a2-8398-b65227d406b6
Title : Potential Mfdetours.DLL Sideloading
Rule id : d2605a99-2218-4894-8fd3-2afb7946514d
Url |
---|
Title : Unsigned Mfdetours.DLL Sideloading
Rule id : 948a0953-f287-4806-bbcb-3b2e396df89f
Url |
---|
Title : Potential DLL Sideloading Of MpSvc.DLL
Rule id : 5ba243e5-8165-4cf7-8c69-e1d3669654c1
Url | |
---|---|
https://hijacklibs.net/entries/microsoft/built-in/mpsvc.html | pdf/aea4186e444c63358e595484196b30efcf4bc5d2b61822d7fdb64952100e258c.pdf |
Title : Potential DLL Sideloading Of MsCorSvc.DLL
Rule id : cdb15e19-c2d0-432a-928e-e49c8c60dcf2
Url | |
---|---|
https://hijacklibs.net/entries/microsoft/built-in/mscorsvc.html | pdf/c4700d776937fe99a01d1c35debb0fee2bc17f3c7f8ef7173b9f92e7be7d510d.pdf |
Title : Potential DLL Sideloading Of Non-Existent DLLs From System Folders
Rule id : 6b98b92b-4f00-4f62-b4fe-4d1920215771
Title : Microsoft Office DLL Sideload
Rule id : 829a3bdf-34da-4051-9cf4-8ed221a8ae4f
Url | |
---|---|
https://hijacklibs.net/ | pdf/59e92a6cdff98649d8a6839064d8400dd8c6a2c14b889fc3750bc169ee3bc8e9.pdf |
Title : Potential Python DLL SideLoading
Rule id : d36f7c12-14a3-4d48-b6b8-774b9c66f44d
Title : Potential Rcdll.DLL Sideloading
Rule id : 6e78b74f-c762-4800-82ad-f66787f10c8a
Url | |
---|---|
https://www.trendmicro.com/en_us/research/23/c/iron-tiger-sysupdate-adds-linux-targeting.html | pdf/64517e96c7bf7802e1c7cbc95b7317f2e4c139fd71ef5fd6acb6e6617f471095.pdf |
Title : Potential RjvPlatform.DLL Sideloading From Default Location
Rule id : 259dda31-b7a3-444f-b7d8-17f96e8a7d0d
Url | |
---|---|
https://twitter.com/0gtweet/status/1666716511988330499 | pdf/8a572b2e4607ab5100e90603ebafa6825e75b5311705578c70b1d54fcc8a5b45.pdf |
Title : Potential RjvPlatform.DLL Sideloading From Non-Default Location
Rule id : 0e0bc253-07ed-43f1-816d-e1b220fe8971
Url | |
---|---|
https://twitter.com/0gtweet/status/1666716511988330499 | pdf/8a572b2e4607ab5100e90603ebafa6825e75b5311705578c70b1d54fcc8a5b45.pdf |
Title : Potential RoboForm.DLL Sideloading
Rule id : f64c9b2d-b0ad-481d-9d03-7fc75020892a
Title : DLL Sideloading Of ShellChromeAPI.DLL
Rule id : ee4c5d06-3abc-48cc-8885-77f1c20f4451
Title : Potential ShellDispatch.DLL Sideloading
Rule id : 844f8eb2-610b-42c8-89a4-47596e089663
Url | |
---|---|
https://www.hexacorn.com/blog/2023/06/07/this-lolbin-doesnt-exist/ | pdf/eeae91e280c886ec952e542b1babb54442423ab12a34176aa0a9b8710353d15e.pdf |
Title : Potential SmadHook.DLL Sideloading
Rule id : 24b6cf51-6122-469e-861a-22974e9c1e5b
Title : Potential SolidPDFCreator.DLL Sideloading
Rule id : a2edbce1-95c8-4291-8676-0d45146862b3
Url | |
---|---|
https://lab52.io/blog/new-mustang-pandas-campaing-against-australia/ | pdf/4285ca82bd9a2329a0263d192c99b20add28e934beca8893df430d6a0c6e560e.pdf |
Title : Third Party Software DLL Sideloading
Rule id : f9df325d-d7bc-4a32-8a1a-2cc61dcefc63
Url | |
---|---|
https://hijacklibs.net/ | pdf/59e92a6cdff98649d8a6839064d8400dd8c6a2c14b889fc3750bc169ee3bc8e9.pdf |
Title : Fax Service DLL Search Order Hijack
Rule id : 828af599-4c53-4ed2-ba4a-a9f835c434ea
Url | |
---|---|
https://windows-internals.com/faxing-your-way-to-system/ | pdf/1728f5e28e4b48318e40a4ae318e5136a4aaf003a0337b5eb2b0a7b37e4bcbc5.pdf |
Title : Potential Vivaldi_elf.DLL Sideloading
Rule id : 2092cacb-d77b-4f98-ab0d-32b32f99a054
Url | |
---|---|
https://research.checkpoint.com/2023/beyond-the-horizon-traveling-the-world-on-camaro-dragons-usb-flash-drives/ | pdf/b876c49c8de9f1b48434582ecd35d217f1e569d05b1ec4fe5d1934e74c44f65e.pdf |
Title : VMGuestLib DLL Sideload
Rule id : 70e8e9b4-6a93-4cb7-8cde-da69502e7aff
Url | |
---|---|
https://decoded.avast.io/martinchlumecky/png-steganography/ | pdf/0eca9b786ba1979b075adeb7f9557e8b91da314dc9e07fe4ecc249906e2a4ab4.pdf |
Title : VMMap Signed Dbghelp.DLL Potential Sideloading
Rule id : 98ffaed4-aec2-4e04-9b07-31492fe68b3d
Title : VMMap Unsigned Dbghelp.DLL Potential Sideloading
Rule id : 273a8dd8-3742-4302-bcc7-7df5a80fe425
Title : Potential DLL Sideloading Via VMware Xfer
Rule id : 9313dc13-d04c-46d8-af4a-a930cc55d93b
Url | |
---|---|
https://www.sentinelone.com/labs/lockbit-ransomware-side-loads-cobalt-strike-beacon-with-legitimate-vmware-utility/ | pdf/a262549feae557281df9d76749ecd69e16fe7fddf44164b62242602373c72ea7.pdf |
Title : Potential Waveedit.DLL Sideloading
Rule id : 71b31e99-9ad0-47d4-aeb5-c0ca3928eeeb
Url | |
---|---|
https://www.trendmicro.com/en_us/research/23/f/behind-the-scenes-unveiling-the-hidden-workings-of-earth-preta.html | pdf/fda1a05909c00f5a7acde2d7a4efdb336956c1e8cdc6de16ad3b449230406cf8.pdf |
Title : Potential Wazuh Security Platform DLL Sideloading
Rule id : db77ce78-7e28-4188-9337-cf30e2b3ba9f
Url | |
---|---|
https://www.trendmicro.com/en_us/research/23/c/iron-tiger-sysupdate-adds-linux-targeting.html | pdf/64517e96c7bf7802e1c7cbc95b7317f2e4c139fd71ef5fd6acb6e6617f471095.pdf |
Title : Potential Mpclient.DLL Sideloading
Rule id : 418dc89a-9808-4b87-b1d7-e5ae0cb6effc
Title : Potential WWlib.DLL Sideloading
Rule id : e2e01011-5910-4267-9c3b-4149ed5479cf
Title : Windows Spooler Service Suspicious Binary Load
Rule id : 02fb90de-c321-4e63-a6b9-25f4b03dfd14
Title : Unsigned Module Loaded by ClickOnce Application
Rule id : 060d5ad4-3153-47bb-8382-43e5e29eda92
Url | |
---|---|
https://posts.specterops.io/less-smartscreen-more-caffeine-ab-using-clickonce-for-trusted-code-execution-1446ea8051c5 | pdf/86350fb5fe7d2b96ddbdf6b4e6178fe89690b0c8e79dfd8621bb3ee7b8815622.pdf |
Title : DLL Load By System Process From Suspicious Locations
Rule id : 9e9a9002-56c4-40fd-9eff-e4b09bfa5f6c
Url | |
---|---|
https://github.com/hackerhouse-opensource/iscsicpl_bypassUAC (Idea) | pdf/09df39f29fd3edc7bafa28782ba0994c38ce007829107b7da371507068e6cc5b.pdf |
Title : Python Image Load By Non-Python Process
Rule id : cbb56d62-4060-40f7-9466-d8aaf3123f83
Title : DotNet CLR DLL Loaded By Scripting Applications
Rule id : 4508a70e-97ef-4300-b62b-ff27992990ea
Title : Unsigned DLL Loaded by Windows Utility
Rule id : b5de0c9a-6f19-43e0-af4e-55ad01f550af
Title : Suspicious Unsigned Thor Scanner Execution
Rule id : ea5c131b-380d-49f9-aeb3-920694da4d4b
Url |
---|
Title : UAC Bypass Using Iscsicpl - ImageLoad
Rule id : 9ed5959a-c43c-4c59-84e3-d28628429456
Title : UAC Bypass With Fake DLL
Rule id : a5ea83a7-05a5-44c1-be2e-addccbbd8c03
Url | |
---|---|
https://steemit.com/utopian-io/@ah101/uac-bypassing-utility | pdf/5e304462cf032311c5d042ada497c672585bac5a0d76cfc73bc5228b99beeb18.pdf |
Title : APT PRIVATELOG Image Load Pattern
Rule id : 33a2d1dd-f3b0-40bd-8baf-7974468927cc
Title : WMI Module Loaded By Uncommon Process
Rule id : 671bb7e3-a020-4824-a00e-2ee5b55f385e
Url | |
---|---|
https://threathunterplaybook.com/hunts/windows/190811-WMIModuleLoad/notebook.html | pdf/ae537512f8e3d4a6db552b4887532f7a36009e1628c3df69600a726cf8cb8d12.pdf |
Title : WMI Persistence - Command Line Event Consumer
Rule id : 05936ce2-ee05-4dae-9d03-9a391cf2d2c6
Url | |
---|---|
https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/ | pdf/004ad9fb23567ac10f1e6fb8d05c093085a2265e916adb38e141b21aab7a1f43.pdf |
Title : WMIC Loading Scripting Libraries
Rule id : 06ce37c2-61ab-4f05-9ff5-b1a96d18ae32
Title : Wmiprvse Wbemcomn DLL Hijack
Rule id : 7707a579-e0d8-4886-a853-ce47e4575aaa
Url | |
---|---|
https://threathunterplaybook.com/hunts/windows/201009-RemoteWMIWbemcomnDLLHijack/notebook.html | pdf/48fa2f0c27fb84efdab4a9f87c0c08dc3bbcbeed8ccb2e3cb0c99392188266c3.pdf |
Title : Suspicious WSMAN Provider Image Loads
Rule id : ad1f4bb9-8dfb-4765-adb6-2a7cfb6c0f94