
Summary
The rule titled 'Kernel Service Installed - Windows' is aimed at detecting the installation of potentially malicious kernel drivers in Windows environments, specifically via the monitoring of Event ID 7045. Adversaries often exploit known vulnerabilities in signed drivers to execute arbitrary code at the kernel level, a tactic known as Bring Your Own Vulnerable Driver (BYOVD). The detection logic utilizes Splunk to filter Windows System Event logs for entries indicating the creation or modification of services associated with .sys files. The ruleset captures various attributes like the timestamp, host, user, and details of the service being created or modified, enabling security teams to identify and respond to potential threats effectively. This detection is critical as it intersects with tactics related to persistence and privilege escalation, making it a vital component of a robust security posture.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Application Log
- Logon Session
ATT&CK Techniques
- T1543.003
- T1068
- T1543
Created: 2024-04-19