Driver Load From A Temporary Directory
Detects a driver load from a temporary directory
Sigma rule (View on GitHub)
1title: Driver Load From A Temporary Directory
2id: 2c4523d5-d481-4ed0-8ec3-7fbf0cb41a75
3status: test
4description: Detects a driver load from a temporary directory
5references:
6 - Internal Research
7author: Florian Roth (Nextron Systems)
8date: 2017/02/12
9modified: 2021/11/27
10tags:
11 - attack.persistence
12 - attack.privilege_escalation
13 - attack.t1543.003
14logsource:
15 category: driver_load
16 product: windows
17detection:
18 selection:
19 ImageLoaded|contains: '\Temp\'
20 condition: selection
21falsepositives:
22 - There is a relevant set of false positives depending on applications in the environment
23level: high
References
Related rules
- Service Installation in Suspicious Folder
- Suspicious Service Installation
- PSEXEC Remote Execution File Artefact
- Moriya Rootkit - System
- New Kernel Driver Via SC.EXE