← Back to Explore
sigmamediumHunting
Potential Goopdate.DLL Sideloading
Detects potential DLL sideloading of "goopdate.dll", a DLL used by googleupdate.exe
Detection Query
selection:
ImageLoaded|endswith: \goopdate.dll
filter_main_generic:
ImageLoaded|startswith:
- C:\Program Files (x86)\
- C:\Program Files\
filter_optional_dropbox_installer_temp:
Image|contains|all:
- \AppData\Local\Temp\GUM
- .tmp\Dropbox
ImageLoaded|contains|all:
- \AppData\Local\Temp\GUM
- .tmp\goopdate.dll
filter_optional_googleupdate_temp:
Image|contains:
- \AppData\Local\Temp\GUM
- :\Windows\SystemTemp\GUM
Image|endswith: .tmp\GoogleUpdate.exe
ImageLoaded|contains:
- \AppData\Local\Temp\GUM
- :\Windows\SystemTemp\GUM
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
Author
X__Junior (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Created
2023-05-15
Data Sources
windowsImage Load Events
Platforms
windows
Tags
attack.persistenceattack.defense-evasionattack.privilege-escalationattack.t1574.001
Raw Content
title: Potential Goopdate.DLL Sideloading
id: b6188d2f-b3c4-4d2c-a17d-9706e0851af0
status: test
description: Detects potential DLL sideloading of "goopdate.dll", a DLL used by googleupdate.exe
references:
- https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/goofy-guineapig/NCSC-MAR-Goofy-Guineapig.pdf
author: X__Junior (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
date: 2023-05-15
modified: 2025-10-07
tags:
- attack.persistence
- attack.defense-evasion
- attack.privilege-escalation
- attack.t1574.001
logsource:
category: image_load
product: windows
detection:
selection:
ImageLoaded|endswith: '\goopdate.dll'
filter_main_generic:
ImageLoaded|startswith:
# Many third party chromium based apps use this DLLs. It's better to create a baseline and add specific filters
- 'C:\Program Files (x86)\'
- 'C:\Program Files\'
filter_optional_dropbox_installer_temp:
Image|contains|all:
- '\AppData\Local\Temp\GUM'
- '.tmp\Dropbox'
ImageLoaded|contains|all:
- '\AppData\Local\Temp\GUM'
- '.tmp\goopdate.dll'
filter_optional_googleupdate_temp:
Image|contains:
- '\AppData\Local\Temp\GUM'
- ':\Windows\SystemTemp\GUM'
Image|endswith: '.tmp\GoogleUpdate.exe'
ImageLoaded|contains:
- '\AppData\Local\Temp\GUM'
- ':\Windows\SystemTemp\GUM'
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
falsepositives:
- False positives are expected from Google Chrome installations running from user locations (AppData) and other custom locations. Apply additional filters accordingly.
- Other third party chromium browsers located in AppData
level: medium