-
-
Notifications
You must be signed in to change notification settings - Fork 2.4k
Create UI Automation Core DLL Loading Detection #5555
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Detects when a process loads UIAutomationCore.dll, which may indicate abuse of Microsoft's UI Automation framework. This technique has been observed in Coyote malware for credential theft from banking applications and cryptocurrency exchanges. The rule monitors for processes that load the UI Automation Core library, which enables automated interaction with UI elements.
adjusted spaces
adjusted spaces
…ess_creation_uiautomationcore_suspicious_loaded.yml title updated
… win_proc_creation_uiac_susp_loaded.yml
…automationcore_unusual_usage.yml
…l to proc_creation_win_uiacore_unusual_usage.yml
Hi All, I tried to change file name in all formats but still its failing. Can someone help me with that? |
It's because you are using the proc_creation prefix for image_load rule. |
Ah, got it let me do changes. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This rule is already covered by Potential System DLL Sideloading From Non System Locations
@prashanthpulisetti Did you observe/produce matches with these? Then we should integrate it to the existing rule - '\narrator.exe'
- '\osk.exe'
- '\magnify.exe'
- '\utilman.exe'
- '\sethc.exe'
- '\AtBroker.exe'
- '\displayswitch.exe' |
Hi @phantinuss , I haven’t tested it yet, but I believe these are legitimate Windows accessibility tools (like Narrator, Magnifier, and On-Screen Keyboard) that typically load UIAutomationCore.dll during normal operation. I added them to the filter to reduce false positives .... |
Closing as a duplicate for now but if an interesting finding came up, please reopen. |
Detects when a process loads UIAutomationCore.dll, which may indicate abuse of Microsoft's UI Automation framework. This technique has been observed in Coyote malware for credential theft from banking applications and cryptocurrency exchanges. The rule monitors for processes that load the UI Automation Core library, which enables automated interaction with UI elements.
Summary of the Pull Request
Changelog
Example Log Event
Fixed Issues
SigmaHQ Rule Creation Conventions