heroui logo

Start of NT Virtual DOS Machine

Sigma Rules

View Source
Summary
This detection rule is aimed at identifying potentially malicious activity involving the execution of the NT Virtual DOS Machine (NTVDM), which allows 16-bit Windows applications to run on 32-bit Windows operating systems. Specifically, it focuses on two executable files: 'ntvdm.exe' and 'csrstub.exe'. The execution of these processes may indicate an attempt to run legacy or potentially harmful applications that could evade modern security measures, especially if they are not part of legitimate business operations. The rule utilizes the 'process_creation' log source from Windows, indicating that it monitors the creation of processes using the specified file paths. Given that NTVDM can be used for both legitimate and illegitimate purposes, this rule is vital for monitoring environments where 16-bit applications may pose a risk, such as in enterprise settings with strict security requirements.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-07-16