
Summary
This detection rule identifies instances where the Sysmon filter driver is unloaded using the command-line utility "fltmc.exe" on Windows systems. Sysmon is a system monitoring tool that logs system activity to aid in the detection of malicious activity. The unloading of this driver may indicate an attempt to bypass security mechanisms provided by Sysmon, making this a notable action for potential defense evasion techniques. The detection is performed by monitoring both image creation of 'fltmc.exe' and command-line arguments containing the phrases 'unload' and 'sysmon'. The rule focuses on processes that could signify malicious behavior, specifically the unauthorized modification or removal of drivers intended for security monitoring.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Command
Created: 2019-10-23