← Back to Explore
sigmamediumHunting
Potential DLL Sideloading Using Coregen.exe
Detect usage of the "coregen.exe" (Microsoft CoreCLR Native Image Generator) binary to sideload arbitrary DLLs.
Detection Query
selection:
Image|endswith: \coregen.exe
filter_main_legit_paths:
ImageLoaded|startswith:
- C:\Program Files (x86)\Microsoft Silverlight\
- C:\Program Files\Microsoft Silverlight\
- C:\Windows\System32\
- C:\Windows\SysWOW64\
condition: selection and not 1 of filter_main_*
Author
frack113
Created
2022-12-31
Data Sources
windowsImage Load Events
Platforms
windows
Tags
attack.privilege-escalationattack.defense-evasionattack.t1218attack.t1055
Raw Content
title: Potential DLL Sideloading Using Coregen.exe
id: 0fa66f66-e3f6-4a9c-93f8-4f2610b00171
status: test
description: Detect usage of the "coregen.exe" (Microsoft CoreCLR Native Image Generator) binary to sideload arbitrary DLLs.
references:
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Coregen/
author: frack113
date: 2022-12-31
tags:
- attack.privilege-escalation
- attack.defense-evasion
- attack.t1218
- attack.t1055
logsource:
category: image_load
product: windows
detection:
selection:
Image|endswith: '\coregen.exe'
filter_main_legit_paths:
ImageLoaded|startswith:
- 'C:\Program Files (x86)\Microsoft Silverlight\'
- 'C:\Program Files\Microsoft Silverlight\'
- 'C:\Windows\System32\'
- 'C:\Windows\SysWOW64\'
condition: selection and not 1 of filter_main_*
falsepositives:
- Unknown
level: medium