T1574.002

DLL Side-Loading

Adversaries execute malicious payloads by placing a malicious DLL alongside a legitimate, often digitally-signed, application and then invoking that application. Unlike passive DLL search order hijacking (which waits for a victim to run an application), DLL side-loading is active: the adversary both plants the DLL and triggers the legitimate executable. This allows malicious code to run under the cover of a trusted process signature. Common victim executables include security tools, game clients, and enterprise software (e.g., VMware, Symantec, LogMeIn). Widely used by APT groups including MuddyWater, Mustang Panda/TONESHELL, Cobalt Strike operators, and numerous others.

Microsoft Sentinel / Defender
kusto
let SuspiciousLocations = dynamic([
  "\\AppData\\", "\\Temp\\", "\\ProgramData\\",
  "\\Users\\Public\\", "\\Downloads\\"
]);
DeviceImageLoadEvents
| where Timestamp > ago(24h)
| where Signed == false or SignatureState != "SignedValid"
| where FolderPath has_any (SuspiciousLocations)
| join kind=inner (
    DeviceProcessEvents
    | where Timestamp > ago(24h)
    | where ProcessVersionInfoCompanyName != "" 
    | where not(FolderPath has_any ("\\AppData\\", "\\Temp\\", "\\ProgramData\\"))
    | project DeviceId, ProcessId, FileName, FolderPath, ProcessVersionInfoCompanyName, ProcessVersionInfoProductName
) on DeviceId, $left.InitiatingProcessId == $right.ProcessId
| project Timestamp, DeviceName, AccountName,
         LoadedDLL=FileName, DLLPath=FolderPath, SHA256,
         LoadingProcess=FileName1, LoadingProcessPath=FolderPath1,
         Vendor=ProcessVersionInfoCompanyName1
| sort by Timestamp desc
high severity high confidence

Data Sources

Module: Module Load Process: Process Creation Microsoft Defender for Endpoint

Required Tables

DeviceImageLoadEvents DeviceProcessEvents

False Positives

  • Electron-based applications (Teams, Slack, VS Code) that bundle their own unsigned DLLs in AppData
  • Game launchers that use custom DLLs loaded from game installation directories in Program Files
  • Development environments that load debug DLLs from build output directories
  • Some enterprise software installers that extract and load DLLs from TEMP during installation

Unlock Pro Content

Get the full detection package for T1574.002 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections