heroui logo

Potential Privileged System Service Operation - SeLoadDriverPrivilege

Sigma Rules

View Source
Summary
This detection rule focuses on monitoring the usage of the 'SeLoadDriverPrivilege', which is a critical user right in Windows systems that allows loading and unloading device drivers. When users possess this privilege, they have the ability to dynamically manipulate kernel drivers, which can pose a significant security risk if exploited by malicious applications. The detection is primarily built around EventID 4673, logging instances where this privilege is invoked without being associated with legitimate Windows processes. To reduce false positives, the rule includes specific filters that whitelist known legitimate tools such as Sysinternals and processes commonly found in Windows environments. By systematically excluding these known entities, the rule aims to highlight suspicious activities that could indicate attempts to load malicious drivers into the kernel, potentially leading to privilege escalation or other forms of attacks. The rule is particularly useful in environments where monitoring kernel-level privileges is critical for maintaining system integrity.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Logon Session
Created: 2019-04-08