Skip to content

Hide Navigation Hide TOC

Xwizard DLL Sideloading (193d5ccd-6f59-40c6-b5b0-8e32d5ddd3d1)

Detects the execution of Xwizard tool from the non-default directory which can be used to sideload a custom xwizards.dll

Cluster A Galaxy A Cluster B Galaxy B Level
DLL Side-Loading - T1574.002 (e64c62cf-9cd7-4a14-94ec-cdaac43ab44b) Attack Pattern Xwizard DLL Sideloading (193d5ccd-6f59-40c6-b5b0-8e32d5ddd3d1) Sigma-Rules 1
DLL Side-Loading - T1574.002 (e64c62cf-9cd7-4a14-94ec-cdaac43ab44b) Attack Pattern Hijack Execution Flow - T1574 (aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6) Attack Pattern 2