
Summary
This rule, titled 'Malicious Driver Load By Name', is designed to detect the loading of known malicious drivers in Windows operating systems by checking the names of the drivers being loaded. It focuses on a specific set of file names that have been associated with malicious activities, particularly those that are often linked to privilege escalation attacks (labeled with tactics T1543.003 and T1068 in the MITRE ATT&CK framework). The detection mechanism involves monitoring driver load events and looking for filenames that match a predefined list of known malicious drivers. Users are advised to verify the legitimacy of any detected driver name to reduce false positives, as legitimate drivers may have similar names. False positives might also occur due to versioning mismatches that cause legitimate drivers to be detected erroneously as malicious. The rule includes guidance for handling false positives, encouraging users to validate driver identity and version.
Categories
- Windows
Data Sources
- Driver
Created: 2022-10-03