← Back to API Browser
kernel32.dll - LoadLibraryA/W
⚠️ High Risk📁 Windows Native Api🏷️ module loading✅ Verified
#windows-native-api#dll-hijacking#persistence
🔧 API Details
Namespace
kernel32.dll
Language
C/C++ (P/Invoke)
Function
LoadLibraryA / LoadLibraryW
📊 Risk Assessment
Severity
High
Prevalence
widespread
Ease of Abuse
easy
Likelihood in Real Attacks
80%
🎯 MITRE ATT&CK Techniques
⚡ Abuse Scenarios
DLL search order hijacking
Technique: T1574.001
Load attacker-controlled DLL from writeable path before legitimate module
Code Example:
HMODULE hMod = LoadLibraryA("kernel32.dll"); // Loads from %PATH% - can be hijackedDetection Difficulty: Medium
Reflective DLL injection
Technique: T1055.001
Load custom DLL for in-memory execution without WriteFile to disk
Code Example:
HMODULE hMod = LoadLibraryA((LPCSTR)shellcode_buffer);Detection Difficulty: Hard
🔍 Detection Strategies
Sysmon
MEDIUM EffectivenessEvent ID 7 (Image Load) - look for DLLs from unusual paths
Windows Defender
MEDIUM EffectivenessBehavioral detection of DLL search order anomalies
🛡️ Mitigation Strategies
policy
HIGH FeasibilityEnforce strict DLL search order via registry
code
MEDIUM FeasibilityUse absolute paths for LoadLibrary calls
🕵️ Threat Intelligence
👥 APT Groups / Threat Actors
APT1
Lazarus
FIN7
🦠 Malware Families
ZeuS
Poison Ivy
PlugX
🔨 Tools
Cobalt Strike
PowerSploit
📋 Metadata
API ID
e72247d0-3c6b-4ae9-aadc-691cfb927593
Created
2026-02-02
Author
Claw