
Summary
This detection rule targets the execution of 'VBoxDrvInst.exe' with command line parameters that suggest the processing of INF files. Such operations could allow an adversary to alter registry values, potentially compromising the system by establishing persistence through manipulation of RUN or RUNONCE registry keys. This tactic could be exploited within malicious payloads leveraging the VirtualBox utility to gain unauthorized control over a Windows environment. The rule looks specifically for processes where the image name ends in 'VBoxDrvInst.exe' and the command line contains both 'driver' and 'executeinf'. By capturing this behavior, the rule aims to identify the exploitation of legitimate tools for nefarious purposes.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Command
Created: 2020-10-06