heroui logo

LiveKD Driver Creation By Uncommon Process

Sigma Rules

View Source
Summary
This detection rule identifies the creation of the LiveKD driver, specifically monitoring for the instance where it is spawned by any process other than the legitimate 'livekd.exe' or 'livek64.exe'. The target file being monitored is 'C:\Windows\System32\drivers\LiveKdD.SYS'. Given that threat actors may use LiveKD for legitimate purposes, such as debugging, this rule focuses on mitigating the risk of unauthorized privilege escalation or system evasion tactics by checking the process responsible for the driver creation. If the process is not one of the known legitimate executables, an alert is triggered, marking a potential security concern. The rule is set to a high alert level due to the sensitivity of unauthorized modifications to system drivers, which could indicate an ongoing attack. Additionally, false positives are noted, such as legitimate administrator activities where 'livekd.exe' may have been renamed before its usage. Administrators are encouraged to adjust the filter to account for any custom naming conventions used in their environments.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
Created: 2023-05-16