title: Application Whitelisting Bypass via DLL Loaded by odbcconf.exe author: Kirill Kiryanov, Beyu Denis, Daniil Yugoslavskiy, oscd.community date: 2019/10/25 description: Detects defence evasion attempt via odbcconf.exe execution to load DLL detection: SELECTION_1: EventID: 1 SELECTION_2: Image: '*\odbcconf.exe' SELECTION_3: CommandLine: - '*-f*' - '*regsvr*' SELECTION_4: ParentImage: '*\odbcconf.exe' SELECTION_5: Image: '*\rundll32.exe' condition: (SELECTION_1 and ((SELECTION_2 and SELECTION_3) or (SELECTION_4 and SELECTION_5))) falsepositives: - Legitimate use of odbcconf.exe by legitimate user id: 65d2be45-8600-4042-b4c0-577a1ff8a60e level: medium logsource: category: process_creation product: windows modified: 2019/11/07 references: - https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSBinaries/Odbcconf.yml - https://twitter.com/Hexacorn/status/1187143326673330176 status: experimental tags: - attack.defense_evasion - attack.t1218.008 - attack.execution - attack.t1218 ruletype: SIGMA