LoFP LoFP / unikely

Techniques

Sample rules

DLL Loaded From Suspicious Location Via Cmspt.EXE

Description

Detects cmstp loading “dll” or “ocx” files from suspicious locations

Detection logic

condition: selection
selection:
  ImageLoaded|contains:
  - \PerfLogs\
  - \ProgramData\
  - \Users\
  - \Windows\Temp\
  - C:\Temp\
  ImageLoaded|endswith:
  - .dll
  - .ocx
  Image|endswith: \cmstp.exe