Detectionhighexperimental

Trusted Path Bypass via Windows Directory Spoofing

Detects DLLs loading from a spoofed Windows directory path with an extra space (e.g "C:\Windows \System32") which can bypass Windows trusted path verification. This technique tricks Windows into treating the path as trusted, allowing malicious DLLs to load with high integrity privileges bypassing UAC.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Swachchhanda Shrawan Poudel (Nextron Systems)Created Tue Jun 170cbe38c0-270c-41d9-ab79-6e5a9a669290windows
Log Source
WindowsImage Load (DLL)
ProductWindows← raw: windows
CategoryImage Load (DLL)← raw: image_load
Detection Logic
Detection Logic1 selector
detection:
    selection:
        ImageLoaded|contains:
            - ':\Windows \System32\'  # Note the space between "Windows" and "System32"
            - ':\Windows \SysWOW64\'  # Note the space between "Windows" and "SysWOW64"
    condition: selection
False Positives
Unlikely

False positives are unlikely for most environments. High confidence detection.

Rule Metadata
Rule ID
0cbe38c0-270c-41d9-ab79-6e5a9a669290
Status
experimental
Level
high
Type
Detection
Created
Tue Jun 17
Path
rules/windows/image_load/image_load_win_trusted_path_bypass.yml
Raw Tags
attack.persistenceattack.defense-evasionattack.privilege-escalationattack.t1574.007attack.t1548.002
View on GitHub