MITRE ATT&CK Technique
Description
Programs may specify DLLs that are loaded at runtime. Programs that improperly or vaguely specify a required DLL may be open to a vulnerability in which an unintended DLL is loaded. Side-loading vulnerabilities specifically occur when Windows Side-by-Side (WinSxS) manifests (Citation: MSDN Manifests) are not explicit enough about characteristics of the DLL to be loaded. Adversaries may take advantage of a legitimate program that is vulnerable to side-loading to load a malicious DLL. (Citation: Stewart 2014) Adversaries likely use this technique as a means of masking actions they perform under a legitimate, trusted system or software process.
Supported Platforms
Created
April 29, 2026
Last Updated
April 29, 2026
STIX Data
{'created': '2017-05-31T21:30:58.007Z',
'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'description': 'Programs may specify DLLs that are loaded at runtime. '
'Programs that improperly or vaguely specify a required DLL '
'may be open to a vulnerability in which an unintended DLL is '
'loaded. Side-loading vulnerabilities specifically occur when '
'Windows Side-by-Side (WinSxS) manifests (Citation: MSDN '
'Manifests) are not explicit enough about characteristics of '
'the DLL to be loaded. Adversaries may take advantage of a '
'legitimate program that is vulnerable to side-loading to load '
'a malicious DLL. (Citation: Stewart 2014)\n'
'\n'
'Adversaries likely use this technique as a means of masking '
'actions they perform under a legitimate, trusted system or '
'software process.',
'external_references': [{'external_id': 'T1073',
'source_name': 'mitre-attack',
'url': 'https://attack.mitre.org/techniques/T1073'},
{'external_id': 'CAPEC-641',
'source_name': 'capec',
'url': 'https://capec.mitre.org/data/definitions/641.html'},
{'description': 'Microsoft. (n.d.). Manifests. '
'Retrieved June 3, 2016.',
'source_name': 'MSDN Manifests',
'url': 'https://msdn.microsoft.com/en-us/library/aa375365'},
{'description': 'Stewart, A. (2014). DLL '
'SIDE-LOADING: A Thorn in the Side of '
'the Anti-Virus Industry. Retrieved '
'November 12, 2014.',
'source_name': 'Stewart 2014',
'url': 'https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-dll-sideloading.pdf'}],
'id': 'attack-pattern--b2001907-166b-4d71-bb3c-9d26c871de09',
'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
'phase_name': 'defense-evasion'}],
'modified': '2025-10-24T17:49:14.455Z',
'name': 'DLL Side-Loading',
'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
'revoked': True,
'spec_version': '2.1',
'type': 'attack-pattern',
'x_mitre_attack_spec_version': '3.2.0',
'x_mitre_deprecated': False,
'x_mitre_detection': '',
'x_mitre_domains': ['enterprise-attack'],
'x_mitre_is_subtechnique': False,
'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'x_mitre_platforms': ['Windows'],
'x_mitre_version': '1.1'}