CodeIntegrity - Unsigned Kernel Module Loaded
Detects the presence of a loaded unsigned kernel module on the system.
Sigma rule (View on GitHub)
1title: CodeIntegrity - Unsigned Kernel Module Loaded
2id: 951f8d29-f2f6-48a7-859f-0673ff105e6f
3status: test
4description: Detects the presence of a loaded unsigned kernel module on the system.
5references:
6 - https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/operations/event-id-explanations
7 - https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/operations/event-tag-explanations
8 - Internal Research
9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2023-06-06
11tags:
12 - attack.privilege-escalation
13logsource:
14 product: windows
15 service: codeintegrity-operational
16detection:
17 selection:
18 EventID: 3001 # Code Integrity determined an unsigned kernel module %2 is loaded into the system. Check with the publisher to see if a signed version of the kernel module is available
19 condition: selection
20falsepositives:
21 - Unlikely
22level: high
References
Related rules
- ADCS Certificate Template Configuration Vulnerability
- ADCS Certificate Template Configuration Vulnerability with Risky EKU
- APT PRIVATELOG Image Load Pattern
- AWS Attached Malicious Lambda Layer
- AWS Glue Development Endpoint Activity