SigmaHQ/rules/windows/process_creation/win_winword_dll_load.yml
stvetro d7709d2236 Small fix
Add "\" to file path end
2020-10-23 12:44:46 +04:00

26 lines
675 B
YAML

title: Winword.exe Loads Suspicious DLL
id: 2621b3a6-3840-4810-ac14-a02426086171
status: experimental
description: Detects Winword.exe loading of custmom dll via /l cmd switch
references:
- https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/LOLUtilz/OtherMSBinaries/Winword.yml
author: Victor Sergeev, oscd.community
date: 2020/10/09
logsource:
category: process_creation
product: windows
detection:
image_path:
Image|endswith: '\winword.exe'
cmd:
CommandLine|contains: '/l'
condition: image_path and cmd
fields:
- CommandLine
tags:
- attack.defense_evasion
- attack.t1202
falsepositives:
- Unknown
level: medium