Detection rules › Sigma

Potential DLL Injection Via AccCheckConsole

Severity
medium
Author
Florian Roth (Nextron Systems)
Source
upstream

Detects the execution "AccCheckConsole" a command-line tool for verifying the accessibility implementation of an application's UI. One of the tests that this checker can run are called "verification routine", which tests for things like Consistency, Navigation, etc. The tool allows a user to provide a DLL that can contain a custom "verification routine". An attacker can build such DLLs and pass it via the CLI, which would then be loaded in the context of the "AccCheckConsole" utility.

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: all of selection_img

or:
Image|endswith: '\AccCheckConsole.exe'
OriginalFileName: AccCheckConsole.exe

Stage 2: all of selection_cli

or:
CommandLine|contains: ' -hwnd'
CommandLine|contains: ' -process '
CommandLine|contains: ' -window '

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • -hwnd
  • -process
  • -window
Imageends_with
  • \AccCheckConsole.exe
OriginalFileNameeq
  • AccCheckConsole.exe