Esc
DLL - T1574.001
(ATT&CK® Technique)
Definition
Adversaries may execute their own malicious payloads by hijacking the search order used to load DLLs. Windows systems use a common method to look for required DLLs to load into a program. Hijacking DLL loads may be for the purpose of establishing persistence as well as elevating privileges and/or evading restrictions on file execution.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.