Potential Arbitrary DLL Load Using Winword (f7375e28-5c14-432f-b8d1-1db26c832df3)
Detects potential DLL sideloading using the Microsoft Office winword process via the '/l' flag.
| Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
|---|---|---|---|---|
| Potential Arbitrary DLL Load Using Winword (f7375e28-5c14-432f-b8d1-1db26c832df3) | Sigma-Rules | Indirect Command Execution - T1202 (3b0e52ce-517a-4614-a523-1bd5deef6c5e) | Attack Pattern | 1 |