Driver Load From A Temporary Directory
Detects a driver load from a temporary directory
Sigma rule (View on GitHub)
1title: Driver Load From A Temporary Directory
2id: 2c4523d5-d481-4ed0-8ec3-7fbf0cb41a75
3status: test
4description: Detects a driver load from a temporary directory
5references:
6 - Internal Research
7author: Florian Roth (Nextron Systems)
8date: 2017-02-12
9modified: 2021-11-27
10tags:
11 - attack.persistence
12 - attack.privilege-escalation
13 - attack.t1543.003
14logsource:
15 category: driver_load
16 product: windows
17detection:
18 selection:
19 ImageLoaded|contains: '\Temp\'
20 condition: selection
21falsepositives:
22 - There is a relevant set of false positives depending on applications in the environment
23level: high
References
Related rules
- Moriya Rootkit - System
- Moriya Rootkit File Created
- New Kernel Driver Via SC.EXE
- New Service Creation Using PowerShell
- New Service Creation Using Sc.EXE