Systemd Loading a Linux Kernel Module Using modprobe

Detects the systemd process loading a Linux Kernel Modules using modprobe. Part of the RedCanary 2024 Threat Detection Report.

Sigma rule (View on GitHub)

 1title: Systemd Loading a Linux Kernel Module Using modprobe
 2id: 4d786f58-8222-4047-b635-6432da31bd7c
 3status: experimental
 4description: |
 5    Detects the systemd process loading a Linux Kernel Modules using modprobe. Part of the 
 6    RedCanary 2024 Threat Detection Report.    
 7references:
 8    - https://redcanary.com/threat-detection-report/techniques/kernel-modules-and-extensions/
 9author: RedCanary, Sigma formatting by Micah Babinski
10date: 2024/03/21
11tags:
12    - attack.persistence
13    - attack.privilege_escalation
14    - attack.t1547
15    - attack.t1547.006
16logsource:
17    product: linux
18    category: process_creation
19detection:
20    selection1:
21        ParentImage|endswith: '/systemd'
22        Image|endswith: '/modprobe'
23        CommandLine|contains:
24            - '-a'
25            - '-af'
26            - '-fa'
27    selection2:
28        CommandLine|re: '^.*modprobe.*\s[a-zA-Z].*$' # looks for commands with an argument that does
29        # not begin with '-'
30    condition: all of selection*
31falsepositives:
32    - Unknown
33level: low```

References

Related rules

to-top