Detection rules › Splunk

Windows Remote Access Software BRC4 Loaded Dll

Author
Teoderick Contreras, Splunk
Source
upstream

The following analytic identifies the loading of four specific Windows DLLs (credui.dll, dbghelp.dll, samcli.dll, winhttp.dll) by a non-standard process. This detection leverages Sysmon EventCode 7 to monitor DLL load events and flags when all four DLLs are loaded within a short time frame. This activity is significant as it may indicate the presence of Brute Ratel C4, a sophisticated remote access tool used for credential dumping and other malicious activities. If confirmed malicious, this behavior could lead to unauthorized access, credential theft, and further compromise of the affected system.

MITRE ATT&CK coverage

TacticTechniques
Credential AccessT1003 OS Credential Dumping
Command & ControlT1219 Remote Access Tools

Event coverage

ProviderEvent IDTitle
Sysmon7Image loaded

Stages and Predicates

Stage 1: search

search EventCode=7

Stage 2: search

search span="30s"

Stage 3: eval

eval ... using (1, OriginalFileName)

Stage 4: eval

eval ... using (1, ImageLoaded)

Stage 5: stats

stats BY Image, BRC4_LoadedDllPath, BRC4_AnomalyLoadedDll, dest, Signed

Stage 6: where

where

Stage 7: search

search

Stage 8: search

search

Stage 9: search

search `macro`

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
EventCodeeq
  • 7 corpus 35 (splunk 35)
spaneq
  • 30s

Neighbors

Stricter alternatives (narrower than this rule)

The rules below may be useful if you find the current rule is too noisy / lacks specificity.