
Summary
This rule detects the loading of malicious drivers on Windows systems by looking for specific cryptographic hash values. A comprehensive dataset of bad driver hashes, including MD5, SHA1, SHA256, and IMPHASH values, is used to identify known malicious drivers when they are loaded by the system. The detection method relies on monitoring system logs for driver load events and matches calculated hashes against the list of known malicious ones. This rule functions as an essential element in the defense against privilege escalation attacks, where attackers may install malicious drivers to compromise the system or gain elevated privileges. Its implementation is crucial for maintaining system integrity and preventing exploitation through malicious kernel-level operations.
Categories
- Windows
- Endpoint
Data Sources
- Driver
- Logon Session
Created: 2022-08-18