CodeIntegrity - Revoked Kernel Driver Loaded

Detects the load of a revoked kernel driver

Sigma rule (View on GitHub)

 1title: CodeIntegrity - Revoked Kernel Driver Loaded
 2id: 320fccbf-5e32-4101-82b8-2679c5f007c6
 3status: test
 4description: Detects the load of a revoked kernel driver
 5references:
 6    - https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/operations/event-id-explanations
 7    - https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/operations/event-tag-explanations
 8    - Internal Research
 9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2023-06-06
11tags:
12    - attack.privilege-escalation
13logsource:
14    product: windows
15    service: codeintegrity-operational
16detection:
17    selection:
18        EventID:
19            - 3021 # Code Integrity determined a revoked kernel module %2 is loaded into the system.  Check with the publisher to see if a new signed version of the kernel module is available.
20            - 3022 # Code Integrity determined a revoked kernel module %2 is loaded into the system. The image is allowed to load because kernel mode debugger is attached.
21    condition: selection
22falsepositives:
23    - Unlikely
24level: high

References

Related rules

to-top