heroui logo

LiveKD Driver Creation

Sigma Rules

View Source
Summary
This detection rule identifies the creation of the LiveKD driver, specifically targeting the file 'LiveKdD.SYS' located in the Windows system drivers directory, which is commonly associated with live kernel debugging. The rule captures events generated during the execution of specific LiveKD executables ('livekd.exe' and 'livek64.exe'). Given that the LiveKD driver can facilitate privilege escalation and is sometimes used in defense evasion tactics, its unauthorized or suspicious usage is a noteworthy security concern. It is essential to monitor this activity as it can indicate a potential exploit attempt or a misuse of legitimate debugging tools. While the rule aims to detect malicious behavior, it's important to acknowledge that legitimate usage by system administrators could also trigger alerts, classifying such events as false positives. Therefore, a careful investigation is recommended in contexts where LiveKD is employed for legitimate purposes. Implementing this detection can help bolster security posture by promptly alerting on potentially dangerous driver creation activities.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
Created: 2023-05-16