DLL Hijacking Evolved
Back in November 2007, Iâve seen this technique used by one of the variant of Worm called W32/Drom. The technique was not to execute the malicious file or component of the worm but to prevent Antivirus Program from running. The Worm queries the following Antivirus registries to get the Installation Path, once acquired, it creates a folder named âws2_32.dllâ with Hidden and System attributes on that location. As I test this technique, it prevented the program from running as it first loads the âws2_32.dllâ folder in the current directory. ...