heroui logo

PUA - Kernel Driver Utility (KDU) Execution

Sigma Rules

View Source
Summary
The rule "PUA - Kernel Driver Utility (KDU) Execution" has been developed to detect the execution of the Kernel Driver Utility (KDU), a tool often used to bypass driver signature enforcement in Windows. By enabling the loading of unsigned or potentially malicious drivers, KDU poses significant security risks, including privilege escalation, persistence mechanisms, and evasion of security measures. This rule detects the presence of KDU through specific filenames associated with the tool and suspicious command-line arguments commonly used in its operation. The detection criteria focus on ensuring that either the image name ends with known indicators of KDU or that certain command-line flags indicative of its usage are detected. False positives may arise during legitimate driver development or testing, marking these instances as benign while still proactively monitoring for potential exploit scenarios. This rule, marked with high severity, aims to bolster endpoint security in Windows environments by identifying potentially malicious activities linked to driver manipulation.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2026-01-02