
Summary
This rule is designed to detect the loading of the HackSys Extreme Vulnerable Driver (HEVD), which is a vulnerable Windows driver often used for educational purposes in the security community. It serves as a tool for security researchers and enthusiasts to practice kernel exploitation techniques. However, its vulnerabilities can also be exploited by malicious actors to gain elevated privileges on a system, making detection critical. The rule examines system events related to driver loading and specifically looks for the presence of the HEVD driver or its unique hash signatures. The detection mechanism utilizes criteria that identifies when the driver image loaded ends with '\HEVD.sys' or matches specific import hashes associated with the vulnerable driver. Given the nature of this driver, the potential for abuse is high, thus necessitating a stringent detection process to mitigate risks associated with privilege escalation attacks.
Categories
- Endpoint
- Windows
Data Sources
- Driver
- Process
Created: 2022-08-18