03-19-2022 10:28 AM
Greetings ,
The single most common and repeating alert which we are getting is like below :
'' 173 'Hijacked DLL Injection' alerts detected by XDR Agent on 24 hosts ''
Explanation is 'DLL attempted to load from blacklisted location' .So 2 questions here
What we are supposed to do here ? What is the investigation path we should follow ? What above alert means ?Should we be worried ?
I assume I have read that this protection module is among those modules which cannot be configured or modified ?
Overall looking to understand these type of alerts though they appear as ' Detected(Reported)' and Not Prevented(Blocked) .
Thanks in advance for response
03-21-2022 02:41 AM
Hi @Balaraju You'll need to take a look at the alert itself, and investigate through the Causality Chain to identify the DLL that is being tried to load. You will see a process that is trying to load the DLL for each alert.
Next, look at your Exploit profile applied to the endpoint/set of endpoints. You probably have a list of DLL's blocked in the Profile configuration.
The configuration of that setting determines if the attack is disabled, reported or prevented.
Ref: https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-prevent-admin/endpoint-security/endpo...
03-21-2022 02:56 AM
Thanks for your response . This is helpful
03-21-2022 03:01 AM
Great, happy to advise you on the right track!
03-21-2022 03:03 AM
The process in almost all cases is 'rundll32.exe' , though the Exploit profile is set as Default(Block) , all the alerts show up as Detected(Reported) . No block list has been configured either in the Exploit profile .
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!