CodeIntegrity - Revoked Image Loaded
Detects image load events with revoked certificates by code integrity.
Sigma rule (View on GitHub)
1title: CodeIntegrity - Revoked Image Loaded
2id: 881b7725-47cc-4055-8000-425823344c59
3status: test
4description: Detects image load events with revoked certificates by code integrity.
5references:
6 - https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/operations/event-id-explanations
7 - https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/operations/event-tag-explanations
8 - Internal Research
9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2023-06-06
11tags:
12 - attack.privilege-escalation
13logsource:
14 product: windows
15 service: codeintegrity-operational
16detection:
17 selection:
18 EventID:
19 - 3032 # Code Integrity determined a revoked image %2 is loaded into the system. Check with the publisher to see if a new signed version of the image is available.
20 - 3035 # Code Integrity determined a revoked image %2 is loaded into the system. The image is allowed to load because kernel mode debugger is attached.
21 condition: selection
22falsepositives:
23 - Unlikely
24level: high
References
Related rules
- ADCS Certificate Template Configuration Vulnerability
- ADCS Certificate Template Configuration Vulnerability with Risky EKU
- APT PRIVATELOG Image Load Pattern
- AWS Attached Malicious Lambda Layer
- AWS Glue Development Endpoint Activity