heroui logo

Suspicious Driver Install by pnputil.exe

Sigma Rules

View Source
Summary
This detection rule aims to identify potentially suspicious driver installations on Windows systems using the `pnputil.exe` command-line utility, which is considered a living-off-the-land binary (LOLBIN). The rule triggers when certain command-line arguments commonly associated with installing drivers are detected alongside the execution of `pnputil.exe`. Those arguments include `-i`, `/install`, `-a`, `/add-driver`, and a file with the `.inf` extension. The detection is pinpointed by examining recently executed processes and their command lines, allowing for proactive monitoring of unauthorized or malicious driver installations that could compromise system security. It is essential to review alerts triggered by this rule, as legitimate administrative tasks may also use `pnputil.exe` for legitimate purposes.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2021-09-30