
Summary
The detection rule is designed to identify unauthorized or suspicious unloading of filter drivers on Windows systems using the `fltmc.exe` command. Filter drivers are integral components of the Windows Driver Framework that manage file system and volume access. Malicious actors may leverage this functionality to evade detection by unloading certain drivers to facilitate attacks, such as ransomware or data exfiltration. The rule captures processes initiating from `fltmc.exe`, specifically targeting command lines containing 'unload'.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2023-02-13