heroui logo

Clfs.SYS Loaded By Process Located In a Potential Suspicious Location

Sigma Rules

View Source
Summary
This detection rule is aimed at identifying instances where the Clfs.sys driver, associated with the Common Log File System on Windows, is loaded from potentially suspicious locations. The presence of Clfs.sys in unusual paths can indicate attempts to exploit vulnerabilities, specifically related to several CVEs targeting this system driver. The conditions for triggering an alert include monitoring image loads for the specified DLL (Clfs.sys) combined with checks against a list of directories known for less frequent or suspicious activity, such as user profile directories and temporary internet files. This detection pattern is useful in recognizing potentially malicious behaviors linked to the execution of exploits or unauthorized activities on Windows systems.
Categories
  • Windows
  • Endpoint
Data Sources
  • Image
Created: 2025-01-20