T1574.001

DLL

Adversaries may abuse dynamic-link library (DLL) mechanisms to achieve persistence, privilege escalation, and defense evasion. Techniques include DLL search order hijacking (planting a malicious DLL earlier in the search path), DLL side-loading (placing a malicious DLL alongside a legitimate signed executable), phantom DLL hijacking (targeting references to non-existent DLLs), DLL substitution (replacing a valid DLL), and DLL redirection (using .manifest or .local files). Groups including Chimera, TONESHELL/Mustang Panda, Velvet Ant, APT41, and Aquatic Panda have extensively used these techniques to load malicious payloads under trusted process contexts.

Microsoft Sentinel / Defender
kusto
let SuspiciousPaths = dynamic([
  "\\AppData\\Local\\Temp\\",
  "\\AppData\\Roaming\\",
  "\\ProgramData\\",
  "\\Users\\Public\\",
  "\\Windows\\Temp\\"
]);
let KnownGoodLoaders = dynamic([
  "C:\\Windows\\System32\\",
  "C:\\Windows\\SysWOW64\\",
  "C:\\Program Files\\",
  "C:\\Program Files (x86)\\"
]);
DeviceImageLoadEvents
| where Timestamp > ago(24h)
| where not(FolderPath has_any (KnownGoodLoaders))
| where FolderPath has_any (SuspiciousPaths)
| join kind=inner (
    DeviceProcessEvents
    | where Timestamp > ago(24h)
    | where ProcessIntegrityLevel in ("High", "System")
    | project DeviceId, InitiatingProcessId=ProcessId, InitiatingProcessFileName=FileName, InitiatingProcessFolderPath=FolderPath
) on DeviceId
| where InitiatingProcessFolderPath has_any ("C:\\Program Files\\", "C:\\Windows\\System32\\")
| project Timestamp, DeviceName, AccountName, FileName, FolderPath, SHA256,
         InitiatingProcessFileName, InitiatingProcessFolderPath
| sort by Timestamp desc
high severity medium confidence

Data Sources

Module: Module Load File: File Creation Microsoft Defender for Endpoint

Required Tables

DeviceImageLoadEvents DeviceProcessEvents

False Positives

  • Legitimate portable applications that bundle their own DLLs in AppData (e.g., some update mechanisms for Slack, Teams, or Electron apps)
  • Developer workstations where build artifacts and test DLLs are loaded from non-standard paths
  • Software installers that extract DLLs to TEMP directories during installation and immediately load them
  • Security or monitoring tools that load plugins from user-writable configuration directories

Unlock Pro Content

Get the full detection package for T1574.001 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections