MITRE ATT&CK / T1574.001
T1574.001
DLL
Description
Adversaries may abuse dynamic-link library files (DLLs) in order to achieve persistence, escalate privileges, and evade defenses. DLLs are libraries that contain code and data that can be simultaneously utilized by multiple programs. While DLLs are not malicious by nature, they can be abused through mechanisms such as side-loading, hijacking search order, and phantom DLL hijacking.(Citation: unit 42)Specific ways DLLs are abused by adversaries include:### DLL Sideloading Adversaries may execute their own malicious payloads by side-loading DLLs. Side-loading involves hijacking which DLL a program loads by planting and then invoking a legitimate application that executes their payload(s).Side-loading positions both the victim application and malicious payload(s) alongside each other. Adversaries likely use side-loading as a means of masking actions they perform under a legitimate, trusted, and potentially elevated system or software process. Benign executables used to side-load payloads may not be flagged during delivery and/or execution. Adversary payloads may also be encrypted/packed or otherwise obfuscated until loaded into the memory of the trusted process.Adversaries may also side-load other packages, such as BPLs (Borland Package Library).(Citation: kroll bpl)Adversaries may chain DLL sideloading multiple times to fragment functionality hindering analysis. Adversaries using multiple DLL files can split the loader functions across different DLLs, with a main DLL …
Platforms
Mitigations
- M1038 — Execution Prevention
- M1044 — Restrict Library Loading
- M1051 — Update Software
- M1047 — Audit
- M1013 — Application Developer Guidance
Use our free MITRE ATT&CK lookup tool, or browse the full ATT&CK matrix.
Our coverage
- Screening Serpens: Iranian APT Fuses AppDomainManager Hijacking with New RATs in 2026 Espionage Campaign
- PyPI Malware Campaign Abuses Zulip Chat API as Command-and-Control Channel
- TCLBANKER Banking Trojan Spreads via WhatsApp and Outlook Worm Modules
- PamDOORa: New Linux Backdoor Sells for $900 on Russian Forum, Harvests SSH Credentials via PAM
- MuddyWater Uses Chaos Ransomware as False Flag in Microsoft Teams Espionage Campaign
Source: MITRE ATT&CK Enterprise matrix. View on attack.mitre.org →