Detectionlowtest
Potential 7za.DLL Sideloading
Detects potential DLL sideloading of "7za.dll"
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
WindowsImage Load (DLL)
ProductWindows← raw: windows
CategoryImage Load (DLL)← raw: image_load
Detection Logic
Detection Logic2 selectors
detection:
selection:
ImageLoaded|endswith: '\7za.dll'
filter_main_legit_path:
Image|startswith:
- 'C:\Program Files (x86)\'
- 'C:\Program Files\'
ImageLoaded|startswith:
- 'C:\Program Files (x86)\'
- 'C:\Program Files\'
condition: selection and not 1 of filter_main_*False Positives
Legitimate third party application located in "AppData" may leverage this DLL to offer 7z compression functionality and may generate false positives. Apply additional filters as needed.
References
MITRE ATT&CK
Rule Metadata
Rule ID
4f6edb78-5c21-42ab-a558-fd2a6fc1fd57
Status
test
Level
low
Type
Detection
Created
Fri Jun 09
Author
Path
rules/windows/image_load/image_load_side_load_7za.yml
Raw Tags
attack.defense-evasionattack.persistenceattack.privilege-escalationattack.t1574.001