heroui logo

Windows Kernel Debugger Execution

Sigma Rules

View Source
Summary
This detection rule identifies the execution of the Windows Kernel Debugger (kd.exe), a tool often leveraged in debugging kernel mode and driver development. The rule is designed to capture instances when the kd.exe process starts, which may indicate an attacker attempting to gain deeper insight into system operations, potentially for malicious purposes such as privilege escalation or evasion of defenses. The detection logic focuses on two key attributes: the image path of the process, ensuring it ends with '\kd.exe', and the original file name of the executable being 'kd.exe'. Given that kernel debugging can be a legitimate requirement in controlled environments, the rule acknowledges the potential for false positives, particularly during necessary production debugging activities. Investigation and context assessment are crucial when this detection is triggered, to differentiate between benign and malicious use of kernel debugging tools.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2023-05-15