heroui logo

Driver Load From A Temporary Directory

Sigma Rules

View Source
Summary
This detection rule identifies potentially malicious activity related to driver loading from temporary directories in a Windows environment. The rule specifically looks for instances where a loaded driver contains the string '\Temp\', which is commonly associated with malicious tactics aiming to load drivers from less scrutinized locations for persistence and privilege escalation. Given the nature of driver operations in Windows, this makes it a critical attack vector as attackers may exploit temporary directories to bypass security controls. The rule is designed to trigger on detection events that match this criterion, indicating unauthorized or suspicious driver loading behavior. It is crucial to evaluate any logs raised by this rule closely, as there is a risk of false positives due to legitimate applications using temporary directories for driver loading. The rule has a high level of significance intended for environments where monitoring driver integrity is vital for maintaining security.
Categories
  • Windows
  • Endpoint
Data Sources
  • Driver
  • Logon Session
Created: 2017-02-12