← Back to SOC feed Coverage →

Potential Initial Access via DLL Search Order Hijacking

sigma MEDIUM SigmaHQ
T1566T1566.001T1574T1574.001
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T03:05:59Z · Confidence: medium

Hunt Hypothesis

Adversaries may leverage DLL search order hijacking by placing malicious DLLs in directories of trusted applications to load them during execution, bypassing standard security controls. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential initial access vectors that evade traditional detection mechanisms.

Detection Rule

Sigma (Original)

title: Potential Initial Access via DLL Search Order Hijacking
id: dbbd9f66-2ed3-4ca2-98a4-6ea985dd1a1c
status: test
description: Detects attempts to create a DLL file to a known desktop application dependencies folder such as Slack, Teams or OneDrive and by an unusual process. This may indicate an attempt to load a malicious module via DLL search order hijacking.
references:
    - https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-5d46dd4ac6866b4337ec126be8cee0e115467b3e8703794ba6f6df6432c806bc
    - https://posts.specterops.io/automating-dll-hijack-discovery-81c4295904b0
author: Tim Rauch (rule), Elastic (idea)
date: 2022-10-21
tags:
    - attack.privilege-escalation
    - attack.persistence
    - attack.t1566
    - attack.t1566.001
    - attack.initial-access
    - attack.t1574
    - attack.t1574.001
    - attack.defense-evasion
logsource:
    product: windows
    category: file_event
detection:
    selection:
        Image|endswith:
            # add more processes when you find them
            - '\winword.exe'
            - '\excel.exe'
            - '\powerpnt.exe'
            - '\MSACCESS.EXE'
            - '\MSPUB.EXE'
            - '\fltldr.exe'
            - '\cmd.exe'
            - '\certutil.exe'
            - '\mshta.exe'
            - '\cscript.exe'
            - '\wscript.exe'
            - '\curl.exe'
            - '\powershell.exe'
            - '\pwsh.exe'
        TargetFilename|endswith: '.dll'
        TargetFilename|contains|all:
            - '\Users\'
            - '\AppData\'
        TargetFilename|contains:
            # add more suspicious paths when you find them
            - '\Microsoft\OneDrive\'
            - '\Microsoft OneDrive\'
            - '\Microsoft\Teams\'
            - '\Local\slack\app-'
            - '\Local\Programs\Microsoft VS Code\'
    filter:
        Image|endswith: '\cmd.exe'
        TargetFilename|contains|all:
            - '\Users\'
            - '\AppData\'
            - '\Microsoft\OneDrive\'
            - '\api-ms-win-core-'
    condition: selection and not filter
falsepositives:
    - Unknown
level: medium

KQL (Azure Sentinel)

imFileEvent
| where ((TargetFilePath endswith "\\winword.exe" or TargetFilePath endswith "\\excel.exe" or TargetFilePath endswith "\\powerpnt.exe" or TargetFilePath endswith "\\MSACCESS.EXE" or TargetFilePath endswith "\\MSPUB.EXE" or TargetFilePath endswith "\\fltldr.exe" or TargetFilePath endswith "\\cmd.exe" or TargetFilePath endswith "\\certutil.exe" or TargetFilePath endswith "\\mshta.exe" or TargetFilePath endswith "\\cscript.exe" or TargetFilePath endswith "\\wscript.exe" or TargetFilePath endswith "\\curl.exe" or TargetFilePath endswith "\\powershell.exe" or TargetFilePath endswith "\\pwsh.exe") and TargetFileName endswith ".dll" and (TargetFileName contains "\\Users\\" and TargetFileName contains "\\AppData\\") and (TargetFileName contains "\\Microsoft\\OneDrive\\" or TargetFileName contains "\\Microsoft OneDrive\\" or TargetFileName contains "\\Microsoft\\Teams\\" or TargetFileName contains "\\Local\\slack\\app-" or TargetFileName contains "\\Local\\Programs\\Microsoft VS Code\\")) and (not((TargetFilePath endswith "\\cmd.exe" and (TargetFileName contains "\\Users\\" and TargetFileName contains "\\AppData\\" and TargetFileName contains "\\Microsoft\\OneDrive\\" and TargetFileName contains "\\api-ms-win-core-"))))

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_initial_access_dll_search_order_hijacking.yml