heroui logo

Windows Drivers Loaded by Signature

Splunk Security Content

View Source
Summary
The 'Windows Drivers Loaded by Signature' hunting rule is designed to identify and detect potentially suspicious drivers loaded on Windows systems by analyzing Sysmon Event ID 6, which logs driver load activities. The rule gathers critical information such as the path of the driver, its signature status, and its hash values. Malicious drivers present a significant threat as they can provide attackers with kernel-level access, allowing for the circumvention of security measures or persistent presence in the system. Detection of such activities is crucial for security operations centers (SOCs) as malicious drivers can enable attackers to execute arbitrary code with elevated privileges, leading to severe system compromises and potential data breaches. By ensuring that the Sysmon logs are properly ingested and using the specified search query, security analysts can effectively hunt for and investigate suspicious driver load activities.
Categories
  • Endpoint
Data Sources
  • Pod
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1014
  • T1068
Created: 2024-11-13