DLL Search Order Hijacking (T1574.001)

View on ATT&CK

In Playbook

Associated Tactics

  • Persistence
  • Privilege Escalation
  • Defense Evasion

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
CrowdStrike, Falcon OverWatch Team. (2022, December 30). Retrieved October 19, 2023. Adversaries Hijack DLLs
Harbour, N. (2010, July 15). Malware Persistence without the Windows Registry. Retrieved November 17, 2020. FireEye Hijacking July 2010
Harbour, N. (2011, June 3). What the fxsst?. Retrieved November 17, 2020. FireEye fxsst June 2011
Hexacorn. (2013, December 8). Beyond good ol’ Run key, Part 5. Retrieved August 14, 2024. Hexacorn DLL Hijacking
Microsoft. (, May 23). Microsoft Security Advisory 2269637. Retrieved March 13, 2020. Microsoft Security Advisory 2269637
Microsoft. (2018, May 31). Dynamic-Link Library Redirection. Retrieved March 13, 2020. Microsoft Dynamic-Link Library Redirection
Microsoft. (2018, May 31). Dynamic-Link Library Search Order. Retrieved November 30, 2014. Microsoft Dynamic Link Library Search Order
Microsoft. (n.d.). Manifests. Retrieved December 5, 2014. Microsoft Manifests
Nick Harbour. (2010, September 1). DLL Search Order Hijacking Revisited. Retrieved March 13, 2020. FireEye DLL Search Order Hijacking
OWASP. (2013, January 30). Binary planting. Retrieved June 7, 2016. OWASP Binary Planting