<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>DISM.EXE — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/dism.exe/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/dism.exe/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential DLL Side-Loading via Trusted Microsoft Programs</title><link>https://feed.craftedsignal.io/briefs/2026-05-dll-side-loading/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dll-side-loading/</guid><description>This rule detects potential DLL side-loading attempts by identifying instances of Windows trusted programs (WinWord.exe, EXPLORER.EXE, w3wp.exe, DISM.EXE) being started after being renamed or from a non-standard path, which is a common technique to evade defenses by side-loading a malicious DLL into the memory space of a trusted process.</description><content:encoded><![CDATA[<p>This detection rule identifies instances of Windows trusted programs such as WinWord.exe, EXPLORER.EXE, w3wp.exe, and DISM.EXE executing from unusual paths or after being renamed, which may indicate DLL side-loading. DLL side-loading is a defense evasion technique where a malicious DLL is placed in the same directory as a legitimate executable. When the executable runs, it may load the malicious DLL instead of the legitimate one, allowing the attacker to execute arbitrary code within the context of the trusted process. The detection logic focuses on process executions that deviate from standard installation paths. The targeted processes are commonly used and often whitelisted, making this a potent technique for adversaries to bypass security controls.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., through phishing or exploitation of a vulnerability).</li>
<li>The attacker identifies a trusted Windows program vulnerable to DLL side-loading (WinWord.exe, EXPLORER.EXE, w3wp.exe, or DISM.EXE).</li>
<li>The attacker drops a malicious DLL into a directory where the trusted program is expected to load DLLs from, often alongside a renamed or copied version of the legitimate executable.</li>
<li>Alternatively, the attacker renames the trusted program and places it in a non-standard path.</li>
<li>The attacker executes the renamed or moved trusted program from the non-standard path.</li>
<li>The trusted program loads the malicious DLL due to DLL search order hijacking.</li>
<li>The malicious DLL executes arbitrary code within the context of the trusted process.</li>
<li>The attacker achieves persistence, elevates privileges, or performs other malicious activities, potentially evading detection due to the trusted process context.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful DLL side-loading attack allows the attacker to execute arbitrary code within the context of a trusted Microsoft process. This can lead to privilege escalation, persistence, and further compromise of the system. Since the malicious code is running within a trusted process, it can bypass application whitelisting and other security controls, making it difficult to detect. This can lead to data theft, system disruption, or the installation of malware.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential DLL Side-Loading via Trusted Microsoft Programs&rdquo; to your SIEM to detect suspicious executions of trusted programs from non-standard paths or with modifications.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to provide the necessary data for the Sigma rule to function correctly.</li>
<li>Review and tune the exclusion paths in the Sigma rule to avoid false positives from legitimate software updates, custom enterprise applications, or virtual environments.</li>
<li>Monitor process execution paths using the Sigma rule &ldquo;Potential DLL Side-Loading via Trusted Microsoft Programs&rdquo; and investigate any deviations from standard installation paths.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>dll-side-loading</category><category>windows</category></item></channel></rss>