DLL Side-Loading
Adversaries execute malicious payloads by placing a malicious DLL alongside a legitimate, often digitally-signed, application and then invoking that application. Unlike passive DLL search order hijacking (which waits for a victim to run an application), DLL side-loading is active: the adversary both plants the DLL and triggers the legitimate executable. This allows malicious code to run under the cover of a trusted process signature. Common victim executables include security tools, game clients, and enterprise software (e.g., VMware, Symantec, LogMeIn). Widely used by APT groups including MuddyWater, Mustang Panda/TONESHELL, Cobalt Strike operators, and numerous others.
let SuspiciousLocations = dynamic([
"\\AppData\\", "\\Temp\\", "\\ProgramData\\",
"\\Users\\Public\\", "\\Downloads\\"
]);
DeviceImageLoadEvents
| where Timestamp > ago(24h)
| where Signed == false or SignatureState != "SignedValid"
| where FolderPath has_any (SuspiciousLocations)
| join kind=inner (
DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessVersionInfoCompanyName != ""
| where not(FolderPath has_any ("\\AppData\\", "\\Temp\\", "\\ProgramData\\"))
| project DeviceId, ProcessId, FileName, FolderPath, ProcessVersionInfoCompanyName, ProcessVersionInfoProductName
) on DeviceId, $left.InitiatingProcessId == $right.ProcessId
| project Timestamp, DeviceName, AccountName,
LoadedDLL=FileName, DLLPath=FolderPath, SHA256,
LoadingProcess=FileName1, LoadingProcessPath=FolderPath1,
Vendor=ProcessVersionInfoCompanyName1
| sort by Timestamp desc Data Sources
Required Tables
False Positives
- Electron-based applications (Teams, Slack, VS Code) that bundle their own unsigned DLLs in AppData
- Game launchers that use custom DLLs loaded from game installation directories in Program Files
- Development environments that load debug DLLs from build output directories
- Some enterprise software installers that extract and load DLLs from TEMP during installation
References (5)
- https://attack.mitre.org/techniques/T1574/002/
- https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-dll-sideloading.pdf
- https://unit42.paloaltonetworks.com/dll-hijacking-techniques/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1574.002/T1574.002.md
- https://news.sophos.com/en-us/2023/05/03/doubled-dll-sideloading-dragon-breath/
Unlock Pro Content
Get the full detection package for T1574.002 including response playbook, investigation guide, and atomic red team tests.