CodeIntegrity - Revoked Kernel Driver Loaded
Detects the load of a revoked kernel driver
Sigma rule (View on GitHub)
1title: CodeIntegrity - Revoked Kernel Driver Loaded
2id: 320fccbf-5e32-4101-82b8-2679c5f007c6
3status: test
4description: Detects the load of a revoked kernel driver
5references:
6 - https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/event-id-explanations
7 - https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/event-tag-explanations
8 - Internal Research
9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2023/06/06
11tags:
12 - attack.privilege_escalation
13logsource:
14 product: windows
15 service: codeintegrity-operational
16detection:
17 selection:
18 EventID:
19 - 3021 # Code Integrity determined a revoked kernel module %2 is loaded into the system. Check with the publisher to see if a new signed version of the kernel module is available.
20 - 3022 # Code Integrity determined a revoked kernel module %2 is loaded into the system. The image is allowed to load because kernel mode debugger is attached.
21 condition: selection
22falsepositives:
23 - Unlikely
24level: high
References
Related rules
- CodeIntegrity - Blocked Driver Load With Revoked Certificate
- CodeIntegrity - Blocked Image Load With Revoked Certificate
- CodeIntegrity - Disallowed File For Protected Processes Has Been Blocked
- CodeIntegrity - Revoked Image Loaded
- CodeIntegrity - Unsigned Image Loaded