Process Explorer Driver Creation By Non-Sysinternals Binary
Detects creation of the Process Explorer drivers by processes other than Process Explorer (procexp) itself. Hack tools or malware may use the Process Explorer driver to elevate privileges, drops it to disk for a few moments, runs a service using that driver and removes it afterwards.
Sigma rule (View on GitHub)
1title: Process Explorer Driver Creation By Non-Sysinternals Binary
2id: de46c52b-0bf8-4936-a327-aace94f94ac6
3status: test
4description: |
5 Detects creation of the Process Explorer drivers by processes other than Process Explorer (procexp) itself.
6 Hack tools or malware may use the Process Explorer driver to elevate privileges, drops it to disk for a few moments, runs a service using that driver and removes it afterwards.
7references:
8 - https://learn.microsoft.com/en-us/sysinternals/downloads/process-explorer
9 - https://github.com/Yaxser/Backstab
10 - https://www.elastic.co/security-labs/stopping-vulnerable-driver-attacks
11 - https://news.sophos.com/en-us/2023/04/19/aukill-edr-killer-malware-abuses-process-explorer-driver/
12author: Florian Roth (Nextron Systems)
13date: 2023-05-05
14tags:
15 - attack.persistence
16 - attack.privilege-escalation
17 - attack.t1068
18logsource:
19 product: windows
20 category: file_event
21detection:
22 selection:
23 TargetFilename|contains: '\PROCEXP'
24 TargetFilename|endswith: '.sys'
25 filter_main_process_explorer:
26 Image|endswith:
27 - '\procexp.exe'
28 - '\procexp64.exe'
29 condition: selection and not 1 of filter_main_*
30falsepositives:
31 - Some false positives may occur with legitimate renamed process explorer binaries
32level: high
References
Related rules
- Process Monitor Driver Creation By Non-Sysinternals Binary
- Abuse of Service Permissions to Hide Services Via Set-Service
- Abuse of Service Permissions to Hide Services Via Set-Service - PS
- Account Tampering - Suspicious Failed Logon Reasons
- Activity From Anonymous IP Address