Detection Strategy for Hijack Execution Flow for DLLs

Technique Detected:  DLL | T1574.001

ID: DET0201
Domains: Enterprise
Analytics: AN0577
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN0577

DLL hijacking behaviors including unexpected DLL loads from non-standard directories, replacement of DLLs, phantom DLL insertion, redirection file creation, and substitution of legitimate DLLs. Defender correlates file system modifications, registry changes, and module load telemetry to detect abnormal DLL behavior in trusted processes.

Log Sources
Data Component Name Channel
File Creation (DC0039) WinEventLog:Sysmon EventCode=11
File Metadata (DC0059) WinEventLog:Sysmon EventCode=15
Module Load (DC0016) WinEventLog:Sysmon EventCode=7
Windows Registry Key Modification (DC0063) WinEventLog:Security EventCode=4657
Process Creation (DC0032) WinEventLog:Sysmon EventCode=1
Mutable Elements
Field Description
AllowedDllPaths Known safe DLL directories to suppress false positives (e.g., C:\Windows\System32).
ProcessAllowList Applications expected to load DLLs from non-standard locations (e.g., development tools).
TimeWindow Correlation interval between DLL file creation, registry changes, and module load.
HashBaseline Baseline hashes for legitimate DLLs used to detect substitution.