EXPLORE
← Back to Explore
sigmamediumHunting

Potential Goopdate.DLL Sideloading

Detects potential DLL sideloading of "goopdate.dll", a DLL used by googleupdate.exe

MITRE ATT&CK

persistencedefense-evasionprivilege-escalation

Detection Query

selection:
  ImageLoaded|endswith: \goopdate.dll
filter_main_generic:
  ImageLoaded|startswith:
    - C:\Program Files (x86)\
    - C:\Program Files\
filter_optional_dropbox_installer_temp:
  Image|contains|all:
    - \AppData\Local\Temp\GUM
    - .tmp\Dropbox
  ImageLoaded|contains|all:
    - \AppData\Local\Temp\GUM
    - .tmp\goopdate.dll
filter_optional_googleupdate_temp:
  Image|contains:
    - \AppData\Local\Temp\GUM
    - :\Windows\SystemTemp\GUM
  Image|endswith: .tmp\GoogleUpdate.exe
  ImageLoaded|contains:
    - \AppData\Local\Temp\GUM
    - :\Windows\SystemTemp\GUM
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*

Author

X__Junior (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)

Created

2023-05-15

Data Sources

windowsImage Load Events

Platforms

windows

Tags

attack.persistenceattack.defense-evasionattack.privilege-escalationattack.t1574.001
Raw Content
title: Potential Goopdate.DLL Sideloading
id: b6188d2f-b3c4-4d2c-a17d-9706e0851af0
status: test
description: Detects potential DLL sideloading of "goopdate.dll", a DLL used by googleupdate.exe
references:
    - https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/goofy-guineapig/NCSC-MAR-Goofy-Guineapig.pdf
author: X__Junior (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
date: 2023-05-15
modified: 2025-10-07
tags:
    - attack.persistence
    - attack.defense-evasion
    - attack.privilege-escalation
    - attack.t1574.001
logsource:
    category: image_load
    product: windows
detection:
    selection:
        ImageLoaded|endswith: '\goopdate.dll'
    filter_main_generic:
        ImageLoaded|startswith:
            # Many third party chromium based apps use this DLLs. It's better to create a baseline and add specific filters
            - 'C:\Program Files (x86)\'
            - 'C:\Program Files\'
    filter_optional_dropbox_installer_temp:
        Image|contains|all:
            - '\AppData\Local\Temp\GUM'
            - '.tmp\Dropbox'
        ImageLoaded|contains|all:
            - '\AppData\Local\Temp\GUM'
            - '.tmp\goopdate.dll'
    filter_optional_googleupdate_temp:
        Image|contains:
            - '\AppData\Local\Temp\GUM'
            - ':\Windows\SystemTemp\GUM'
        Image|endswith: '.tmp\GoogleUpdate.exe'
        ImageLoaded|contains:
            - '\AppData\Local\Temp\GUM'
            - ':\Windows\SystemTemp\GUM'
    condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
falsepositives:
    - False positives are expected from Google Chrome installations running from user locations (AppData) and other custom locations. Apply additional filters accordingly.
    - Other third party chromium browsers located in AppData
level: medium