<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Dll-Hijacking — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/dll-hijacking/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 10:16:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/dll-hijacking/feed.xml" rel="self" type="application/rss+xml"/><item><title>AVACAST DLL Hijacking Vulnerability (CVE-2026-7279)</title><link>https://feed.craftedsignal.io/briefs/2026-04-avacast-dll-hijacking/</link><pubDate>Tue, 28 Apr 2026 10:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-avacast-dll-hijacking/</guid><description>A DLL hijacking vulnerability in eMPIA Technology's AVACAST (CVE-2026-7279) allows authenticated local attackers to achieve arbitrary code execution with system privileges by placing a malicious DLL in a specific directory.</description><content:encoded><![CDATA[<p>CVE-2026-7279 describes a DLL hijacking vulnerability affecting AVACAST, a product developed by eMPIA Technology. The vulnerability allows an authenticated local attacker to execute arbitrary code with system-level privileges on a vulnerable system. This is achieved by placing a malicious DLL file in a directory where AVACAST expects to load a legitimate DLL. When AVACAST is executed, it inadvertently loads the malicious DLL, granting the attacker elevated privileges. The vulnerability poses a significant risk to systems where AVACAST is installed, as successful exploitation can lead to complete system compromise. This vulnerability was published on 2026-04-28.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to the targeted system through legitimate credentials or exploits another vulnerability.</li>
<li>The attacker identifies a directory from which AVACAST loads DLL files.</li>
<li>The attacker crafts a malicious DLL file designed to execute arbitrary code.</li>
<li>The attacker places the malicious DLL file in the identified directory, potentially overwriting or replacing a legitimate DLL file.</li>
<li>The attacker executes the AVACAST application or waits for it to be automatically launched.</li>
<li>AVACAST attempts to load the (now malicious) DLL file from the directory.</li>
<li>The malicious DLL executes within the context of the AVACAST process, inheriting its system-level privileges.</li>
<li>The attacker achieves arbitrary code execution with system privileges, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7279 allows a local attacker to execute arbitrary code with system-level privileges. This can result in complete system compromise, including data theft, installation of malware, and disruption of services. Given the high privileges gained, the attacker can perform any action on the system. The number of potential victims is unknown, but any system running a vulnerable version of AVACAST is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for AVACAST loading DLLs from unusual or writable directories using the provided Sigma rule &ldquo;Detect AVACAST DLL Hijacking&rdquo;.</li>
<li>Implement file integrity monitoring on AVACAST installation directories to detect unauthorized DLL modifications.</li>
<li>Deploy the Sigma rule &ldquo;Detect DLL Load from Suspicious Paths&rdquo; to identify DLL loads from unusual paths, which can be indicative of DLL hijacking attempts.</li>
<li>Apply appropriate access controls to prevent unauthorized users from writing to AVACAST installation directories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>dll-hijacking</category><category>privilege-escalation</category><category>code-execution</category></item><item><title>Mobatek MobaXterm Home Edition Uncontrolled Search Path Vulnerability (CVE-2026-6421)</title><link>https://feed.craftedsignal.io/briefs/2026-04-mobaxterm-cve-2026-6421/</link><pubDate>Fri, 17 Apr 2026 06:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mobaxterm-cve-2026-6421/</guid><description>CVE-2026-6421 is an uncontrolled search path vulnerability in Mobatek MobaXterm Home Edition up to version 26.1, affecting msimg32.dll, that can be exploited locally with high complexity.</description><content:encoded><![CDATA[<p>Mobatek MobaXterm Home Edition up to version 26.1 is vulnerable to an uncontrolled search path issue (CVE-2026-6421) within the msimg32.dll library. This vulnerability allows a local attacker to manipulate the search path used by the application, potentially leading to arbitrary code execution. The complexity of exploitation is considered high, and it requires local access to the system. The vendor was responsive and released version 26.2 to address the vulnerability, urging users to upgrade. Public exploits are available, increasing the urgency for remediation. This vulnerability matters to defenders because successful exploitation could lead to privilege escalation or the execution of malicious code within the context of the MobaXterm application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a system with a vulnerable version (&lt;= 26.1) of MobaXterm Home Edition installed.</li>
<li>The attacker crafts a malicious DLL file (e.g., a replacement msimg32.dll or another DLL that msimg32.dll might load).</li>
<li>The attacker places the malicious DLL in a directory that MobaXterm searches before the legitimate system directories.</li>
<li>The attacker executes MobaXterm.</li>
<li>When MobaXterm loads msimg32.dll, it loads the malicious DLL from the attacker-controlled directory instead of the legitimate system directory due to the uncontrolled search path.</li>
<li>The malicious DLL executes arbitrary code within the context of the MobaXterm process.</li>
<li>The attacker leverages the executed code to perform malicious actions, such as installing malware or escalating privileges.</li>
<li>The attacker achieves persistence or further compromises the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6421 allows a local attacker to execute arbitrary code within the context of the MobaXterm process. While the exploit requires local access and is considered to have high complexity, the availability of public exploits increases the risk. The impact of successful exploitation includes potential privilege escalation, malware installation, and further system compromise. Although specific victim counts and sectors targeted are unknown, any system running a vulnerable version of MobaXterm Home Edition is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Mobatek MobaXterm Home Edition to version 26.2 or later to patch CVE-2026-6421, as advised by the vendor.</li>
<li>Implement application control policies to restrict the execution of unauthorized DLLs, mitigating the impact of uncontrolled search path vulnerabilities.</li>
<li>Monitor process creation events for MobaXterm (process name: MobaXterm.exe) loading DLLs from unusual or user-writable directories using the provided Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category><category>mobaxterm</category><category>dll hijacking</category></item><item><title>MemProcFS DLL and Shared Library Hijacking Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-memprocfs-dll-hijacking/</link><pubDate>Wed, 08 Apr 2026 22:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-memprocfs-dll-hijacking/</guid><description>MemProcFS before 5.17 is susceptible to DLL and shared-library hijacking due to unsafe library-loading patterns, allowing attackers to achieve arbitrary code execution by placing malicious libraries or manipulating the library search path.</description><content:encoded><![CDATA[<p>MemProcFS before version 5.17 is vulnerable to DLL and shared library hijacking due to unsafe library loading practices. Specifically, the application uses bare-name <code>LoadLibraryU</code> and <code>dlopen</code> calls without proper path qualification for <code>vmmpyc</code>, <code>libMSCompression</code>, and plugin DLLs. This vulnerability, identified as CVE-2026-40031, exists across six attack surfaces. The vulnerability was reported by VulnCheck. Exploitation can occur on both Windows and Linux systems where MemProcFS is installed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable MemProcFS installation (version &lt; 5.17).</li>
<li>Attacker determines the libraries MemProcFS attempts to load without a fully qualified path, such as <code>vmmpyc</code>, <code>libMSCompression</code>, or plugin DLLs.</li>
<li>Attacker crafts a malicious DLL or shared library with the same name as one of the targeted libraries (e.g., <code>vmmpyc.dll</code> on Windows or <code>libvmmpyc.so</code> on Linux).</li>
<li>Attacker places the malicious library in the same working directory as MemProcFS or manipulates the <code>LD_LIBRARY_PATH</code> environment variable (on Linux) to point to a directory containing the malicious library.</li>
<li>The user executes MemProcFS.</li>
<li>MemProcFS attempts to load the legitimate library using <code>LoadLibraryU</code> or <code>dlopen</code>.</li>
<li>Due to the presence of the malicious library in the working directory or the manipulated <code>LD_LIBRARY_PATH</code>, the malicious library is loaded instead of the intended legitimate library.</li>
<li>The malicious library executes arbitrary code within the context of the MemProcFS process, granting the attacker control over the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40031 allows an attacker to achieve arbitrary code execution. While the exact number of victims is unknown, any system running a vulnerable version of MemProcFS is at risk. Given the nature of MemProcFS, successful exploitation could lead to sensitive data exposure or complete system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade MemProcFS to version 5.17 or later to address the vulnerability (References: <a href="https://github.com/ufrisk/MemProcFS/releases/tag/v5.17">https://github.com/ufrisk/MemProcFS/releases/tag/v5.17</a>).</li>
<li>Monitor process creations for MemProcFS loading unexpected DLLs or shared libraries from non-standard paths using the provided Sigma rules.</li>
<li>Implement file integrity monitoring for MemProcFS installation directories to detect the presence of newly created DLLs or shared libraries with suspicious names.</li>
<li>Educate users about the risks of running applications from untrusted sources and the importance of verifying the integrity of software before execution.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>dll-hijacking</category><category>library-hijacking</category><category>code-execution</category><category>memprocfs</category><category>cve-2026-40031</category></item><item><title>CVE-2026-3780: Local Privilege Escalation via Untrusted Search Path in Application Installer</title><link>https://feed.craftedsignal.io/briefs/2026-04-untrusted-search-path/</link><pubDate>Wed, 01 Apr 2026 02:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-untrusted-search-path/</guid><description>An application installer vulnerable to CVE-2026-3780 runs with elevated privileges but resolves system executables and DLLs using an untrusted search path, enabling local privilege escalation by allowing a local attacker to inject malicious binaries.</description><content:encoded><![CDATA[<p>CVE-2026-3780 describes a local privilege escalation vulnerability affecting an application installer. The installer, when executed, operates with elevated privileges. However, it resolves the location of system executables and DLLs using an untrusted search path. This untrusted path includes directories writable by standard users. An attacker can exploit this by placing malicious binaries, named identically to legitimate system files, in these user-writable directories. When the installer attempts to load or execute these system files, the attacker&rsquo;s malicious versions are used instead, due to the flawed search path resolution. This leads to arbitrary code execution with elevated privileges, thereby escalating the attacker&rsquo;s privileges on the local system. This vulnerability was reported in Foxit products and poses a significant risk to systems where the vulnerable installer is executed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a user-writable directory included in the application installer&rsquo;s search path.</li>
<li>The attacker analyzes the application installer to determine which system executables or DLLs it attempts to load or execute.</li>
<li>The attacker creates malicious binaries that mimic the names of the targeted system files.</li>
<li>The attacker places the malicious binaries into the user-writable directory.</li>
<li>The attacker executes the vulnerable application installer, typically requiring some user interaction (e.g., clicking &ldquo;Install&rdquo;).</li>
<li>The installer, running with elevated privileges, attempts to load or execute the legitimate system files.</li>
<li>Due to the untrusted search path, the installer loads or executes the attacker&rsquo;s malicious binaries instead of the legitimate ones.</li>
<li>The attacker&rsquo;s code executes with elevated privileges, allowing the attacker to perform actions such as creating new accounts, installing software, or modifying system settings, thereby achieving local privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3780 allows a local attacker to gain elevated privileges on the system. This means an attacker with limited access can perform administrative tasks, install malware, access sensitive data, and potentially compromise the entire system. The severity is high because it bypasses normal security controls and can lead to a full system compromise from a limited starting point. This poses a significant risk to any system running the affected application installer.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect DLL Hijacking via Installer&rdquo; to detect the creation of malicious DLLs in user-writable directories, referencing the rule details below.</li>
<li>Enable file creation monitoring in user-writable directories (e.g., %TEMP%, %APPDATA%) to provide data for the Sigma rule and to detect suspicious file activity.</li>
<li>Monitor process creation events for the execution of unexpected binaries within the context of the application installer, leveraging the rule &ldquo;Detect Suspicious Process Execution by Installer&rdquo; defined below.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>cve-2026-3780</category><category>untrusted-search-path</category><category>dll-hijacking</category><category>installer</category></item><item><title>Potential Windows Session Hijacking via CcmExec</title><link>https://feed.craftedsignal.io/briefs/2024-07-sccm-dll-hijacking/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-sccm-dll-hijacking/</guid><description>Adversaries may exploit Microsoft's System Center Configuration Manager by loading malicious DLLs into SCNotification.exe, a process associated with user notifications, potentially leading to Windows session hijacking.</description><content:encoded><![CDATA[<p>Attackers may attempt to hijack Windows user sessions by exploiting Microsoft&rsquo;s System Center Configuration Manager (SCCM). This involves loading malicious DLLs into <code>SCNotification.exe</code>, a process responsible for user notifications within the SCCM framework. The vulnerability arises when <code>SCNotification.exe</code> loads untrusted DLLs, potentially impersonating a user session. This activity is often characterized by recent DLL file creation or modification, coupled with the DLL lacking a trusted code signature. The references indicate this technique has been discussed publicly, raising awareness and the potential for increased exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system.</li>
<li>Attacker places a malicious DLL on the system. This DLL may be disguised to appear legitimate.</li>
<li>The attacker manipulates the system to cause <code>SCNotification.exe</code> to load the malicious DLL. This may involve modifying registry keys or file paths.</li>
<li><code>SCNotification.exe</code> loads the attacker-controlled DLL.</li>
<li>The malicious DLL executes within the context of the <code>SCNotification.exe</code> process.</li>
<li>The attacker leverages the hijacked process to impersonate a user session.</li>
<li>Attacker gains unauthorized access to user accounts and data.</li>
<li>Attacker performs malicious actions under the guise of the compromised user, such as data exfiltration or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to unauthorized access to sensitive data, privilege escalation, and further compromise of the network. Victims could experience data breaches, financial loss, or reputational damage. The impact depends on the extent of access gained by the attacker and the sensitivity of the data accessed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Windows Session Hijacking via CcmExec&rdquo; to your SIEM to detect suspicious DLL loads by <code>SCNotification.exe</code>.</li>
<li>Investigate alerts triggered by the Sigma rule, focusing on DLLs with recent file creation times or modifications (DLL timestamps) and untrusted signatures.</li>
<li>Implement application whitelisting to prevent unauthorized DLLs from being loaded by <code>SCNotification.exe</code> as described in the remediation steps in the note section.</li>
<li>Monitor process creation events for <code>SCNotification.exe</code> and related processes.</li>
<li>Enable Sysmon process creation logging to enhance visibility into process execution events, which activates the Sigma rules above.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>dll-hijacking</category><category>sccm</category></item><item><title>Suspicious Antimalware Scan Interface DLL Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-amsi-dll-hijack/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-amsi-dll-hijack/</guid><description>An adversary may attempt to bypass AMSI by creating a rogue AMSI DLL in an unusual location to evade detection.</description><content:encoded><![CDATA[<p>The Antimalware Scan Interface (AMSI) is a Windows interface that allows applications and services to integrate with antimalware products. Attackers may attempt to bypass AMSI to execute malicious code without detection. This detection identifies the creation of the AMSI DLL (<code>amsi.dll</code>) in unusual locations, which is a common technique used to load a rogue AMSI module instead of the legitimate one. This technique can be used to evade detection by security products that rely on AMSI for scanning potentially malicious scripts and code. The rule is designed to work with data from Winlogbeat, Elastic Endpoint, Sysmon, Endgame, SentinelOne Cloud Funnel, Microsoft Defender XDR, and Crowdstrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., phishing, exploit).</li>
<li>The attacker determines the location of the legitimate <code>amsi.dll</code> file.</li>
<li>The attacker identifies a writable directory where a malicious <code>amsi.dll</code> can be placed. This location must be in the search order of applications that use AMSI, such as PowerShell or other scripting hosts.</li>
<li>The attacker copies or creates a malicious <code>amsi.dll</code> in the identified location. This rogue DLL is designed to bypass or disable AMSI functionality.</li>
<li>A process like PowerShell or another scripting host is launched. Because the malicious <code>amsi.dll</code> is in a higher-priority directory, it is loaded instead of the legitimate AMSI library.</li>
<li>The launched process executes malicious code (e.g., PowerShell script).</li>
<li>Because the rogue <code>amsi.dll</code> is loaded, AMSI scans are bypassed, allowing the malicious code to execute without detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful AMSI bypass can allow attackers to execute malicious code, such as malware, scripts, or exploits, without detection by antimalware products. This can lead to system compromise, data theft, or other malicious activities. The impact can range from a single compromised endpoint to a wider breach of an organization&rsquo;s network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable file creation monitoring with Sysmon or Elastic Defend to detect the creation of files, specifically DLLs, in unusual locations.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Antimalware Scan Interface DLL Creation&rdquo; to your SIEM to detect the creation of <code>amsi.dll</code> in non-standard paths. Tune the rule for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the parent process, file path, and user context to determine if the activity is malicious.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>amsi-bypass</category><category>dll-hijacking</category><category>windows</category></item><item><title>Execution via Local SxS Shared Module</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-local-sxs-dll-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-local-sxs-dll-execution/</guid><description>This rule detects the creation, modification, or deletion of DLL files within Windows SxS local folders, which could indicate an attempt to execute malicious payloads by abusing shared module loading.</description><content:encoded><![CDATA[<p>This detection identifies potential abuse of the Windows Side-by-Side (SxS) feature to execute malicious code. Attackers can place a malicious DLL file within an application&rsquo;s local SxS folder (application.exe.local) and trick the Windows module loader into prioritizing it over legitimate system DLLs. This technique, known as DLL hijacking or DLL redirection, allows adversaries to gain arbitrary code execution within the context of the targeted application. This technique may be used to bypass security controls, escalate privileges, or establish persistence. The detection focuses on file events related to DLLs within these specific SxS folders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker identifies a legitimate application with an associated SxS folder (application.exe.local).</li>
<li>The attacker creates or modifies a malicious DLL file.</li>
<li>The attacker places the malicious DLL file in the application&rsquo;s SxS folder (application.exe.local).</li>
<li>A legitimate application attempts to load a DLL.</li>
<li>Due to the presence of the malicious DLL in the SxS folder, the Windows module loader prioritizes the attacker&rsquo;s DLL.</li>
<li>The malicious DLL is loaded and executed by the application.</li>
<li>The attacker achieves code execution within the context of the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution within the targeted application&rsquo;s context. This can result in privilege escalation, data theft, system compromise, or the establishment of persistence mechanisms. While the number of directly affected organizations is unknown, this technique can be used against a wide range of applications on Windows systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor file creation events for DLL files in <code>C:\*\*.exe.local\*.dll</code> and <code>\\Device\\HarddiskVolume*\\*\\*.exe.local\\*.dll</code> using the provided Sigma rule to detect potential malicious DLL planting.</li>
<li>Enable Sysmon Event ID 11 (File Create) to improve visibility into file creation events, as noted in the <a href="https://ela.st/sysmon-event-11-setup">setup instructions</a>.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the DLL creation event and the involved application.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>dll-hijacking</category></item></channel></rss>