Tag
medium
advisory
Potential DLL Side-Loading via Trusted Microsoft Programs
2 rules 2 TTPsThis rule detects potential DLL side-loading attempts by identifying instances of Windows trusted programs (WinWord.exe, EXPLORER.EXE, w3wp.exe, DISM.EXE) being started after being renamed or from a non-standard path, which is a common technique to evade defenses by side-loading a malicious DLL into the memory space of a trusted process.
WinWord.exe +4
defense-evasion
execution
dll-side-loading
windows
2r
2t
high
advisory
Untrusted DLL Loaded by Azure AD Connect Authentication Agent
2 rules 1 TTPThe loading of an untrusted DLL by the Azure AD Connect Authentication Agent, potentially indicating credential access attempts via the Pass-through Authentication service, is detected by this rule.
Azure AD Connect Authentication Agent
credential-access
dll-side-loading
azure-ad-connect
2r
1t