Name:Windows SQL Server Extended Procedure DLL Loading Hunt id:182ba99f-2dde-4cdb-8e5c-e3b1e251cb10 version:3 date:2026-02-25 author:Michael Haag, Splunk status:production type:Hunting Description:This analytic detects when SQL Server loads DLLs to execute extended stored procedures. This is particularly important for security monitoring as it indicates the first-time use or version changes of potentially dangerous procedures like xp_cmdshell, sp_OACreate, and others. While this is a legitimate operation, adversaries may abuse these procedures for execution, discovery, or privilege escalation. Data_source:
-Windows Event Log Application 8128
search:`wineventlog_application` EventCode=8128
| rex field=EventData_Xml "<Data>(?<dll_name>[^<]+)</Data><Data>(?<dll_version>[^<]+)</Data><Data>(?<procedure_name>[^<]+)</Data>"