
Summary
This analytic rule detects the installation of known vulnerable Windows drivers by leveraging the Windows Event Log's EventCode 7045, which indicates driver loading events. The detection identifies instances where a kernel mode driver is installed and checks it against a list of known vulnerable drivers sourced from loldrivers.io. The significance of this detection lies in the common exploitation of vulnerable drivers by attackers to elevate privileges or establish persistence. If these activities are confirmed as malicious, they could enable attackers to execute arbitrary code with elevated privileges, potentially leading to system compromise or data exfiltration. It is essential to implement this detection properly within a Splunk environment by ensuring that relevant event logs are being collected and configured accurately. Users should also be aware of potential false positives and conduct further investigation on flagged drivers by considering version numbers and digital signatures to validate their legitimacy.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1543.003
- T1014
Created: 2024-11-13