heroui logo

Potential Recon Activity Using DriverQuery.EXE

Sigma Rules

View Source
Summary
The rule detects potential reconnaissance activity initiated by the execution of the "driverquery.exe" utility, which is used in Windows environments to enumerate the drivers installed on the system. The detection focuses on instances where this utility is being executed in a potentially suspicious context. The rule checks for certain conditions in process creation logs to identify if `driverquery.exe` or its associated alias `drvqry.exe` is being utilized. Specifically, it employs a selection mechanism that evaluates both the executable file name and its parent processes. If `driverquery.exe` is executed by specific parent processes such as `cscript.exe`, `mshta.exe`, or others known for script execution, it raises a flag for further investigation. The detection logic expects that all specified conditions are met (i.e., the parent process must be one of those specified while calling the correct image). While this rule is high in criticality, it also notes that legitimate usage such as by system administration scripts could result in false positives, thus requiring careful evaluation of matched events.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2023-01-19