How to detect call from process to dll in Windows system ?

318 views
Skip to first unread message

Schil tech

unread,
Mar 31, 2020, 10:53:37 AM3/31/20
to Wazuh mailing list
 Hello,

I would like to be able to detect a specific DLL that is called by processes.
How to do that with Wazuh? 

Regards,

Schiltech

Jesus Linares

unread,
Apr 1, 2020, 3:21:26 AM4/1/20
to Wazuh mailing list
Hi Schiltech,

You can use Sysmon to monitor DLL calls (Sysmon event ID 7) and Wazuh can collect the logs and trigger the corresponding alert. Take a look at this post: https://wazuh.com/blog/using-wazuh-to-monitor-sysmon-events/

Sysmon Event 7 - Image loaded looks like this:

Image loaded:
UtcTime: 2017-04-28 22:45:16.662
ProcessGuid: {a23eae89-c5fa-5903-0000-0010bf439000}
ProcessId: 12536
Image: C:\Windows\System32\notepad.exe
ImageLoaded: C:\Windows\System32\
ole32.dll
Hashes: SHA1=B2A2BBCFB69B1F0982C4B82055DAD9BAE4384E4B
Signed: true
Signature: Microsoft Windows
SignatureStatus: Valid

 

Event XML:
 
 <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
    <System>
        <Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
        <EventID>7</EventID>
        <Version>3</Version>
        <Level>4</Level>
        <Task>7</Task>
        <Opcode>0</Opcode>
        <Keywords>0x8000000000000000</Keywords>
        <TimeCreated SystemTime="2017-04-28T22:45:16.663226600Z" />
        <EventRecordID>16636</EventRecordID>
        <Correlation />
        <Execution ProcessID="3216" ThreadID="3964" />
        <Channel>Microsoft-Windows-Sysmon/Operational</Channel>
        <Computer>rfsH.lab.local</Computer>
        <Security UserID="S-1-5-18" />
    </System>
    <EventData>
        <Data Name="UtcTime">2017-04-28 22:45:16.662</Data>
        <Data Name="ProcessGuid">{A23EAE89-C5FA-5903-0000-0010BF439000}</Data>
        <Data Name="ProcessId">12536</Data>
        <Data Name="Image">C:\Windows\System32\notepad.exe</Data>
        <Data Name="ImageLoaded">C:\Windows\System32\ole32.dll</Data>
        <Data Name="Hashes">SHA1=B2A2BBCFB69B1F0982C4B82055DAD9BAE4384E4B</Data>
        <Data Name="Signed">true</Data>
        <Data Name="Signature">Microsoft Windows</Data>
        <Data Name="SignatureStatus">Valid</Data>
    </EventData>
</Event>

More info:
Reply all
Reply to author
Forward
0 new messages