CodeIntegrity - Revoked Kernel Driver Loaded
Detects the load of a revoked kernel driver
Sigma rule (View on GitHub)
1title: CodeIntegrity - Revoked Kernel Driver Loaded
2id: 320fccbf-5e32-4101-82b8-2679c5f007c6
3status: test
4description: Detects the load of a revoked kernel driver
5references:
6 - https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/operations/event-id-explanations
7 - https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/operations/event-tag-explanations
8 - Internal Research
9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2023-06-06
11tags:
12 - attack.privilege-escalation
13logsource:
14 product: windows
15 service: codeintegrity-operational
16detection:
17 selection:
18 EventID:
19 - 3021 # Code Integrity determined a revoked kernel module %2 is loaded into the system. Check with the publisher to see if a new signed version of the kernel module is available.
20 - 3022 # Code Integrity determined a revoked kernel module %2 is loaded into the system. The image is allowed to load because kernel mode debugger is attached.
21 condition: selection
22falsepositives:
23 - Unlikely
24level: high
References
Related rules
- ADCS Certificate Template Configuration Vulnerability
- ADCS Certificate Template Configuration Vulnerability with Risky EKU
- APT PRIVATELOG Image Load Pattern
- AWS Attached Malicious Lambda Layer
- AWS Glue Development Endpoint Activity