Filter Driver Unloaded Via Fltmc.EXE
Detect filter driver unloading activity via fltmc.exe
Sigma rule (View on GitHub)
1title: Filter Driver Unloaded Via Fltmc.EXE
2id: 4931188c-178e-4ee7-a348-39e8a7a56821
3related:
4 - id: 4d7cda18-1b12-4e52-b45c-d28653210df8 # Sysmon specific
5 type: derived
6status: test
7description: Detect filter driver unloading activity via fltmc.exe
8references:
9 - https://www.darkoperator.com/blog/2018/10/5/operating-offensively-against-sysmon
10 - https://www.cybereason.com/blog/threat-analysis-report-lockbit-2.0-all-paths-lead-to-ransom
11author: Nasreddine Bencherchali (Nextron Systems)
12date: 2023-02-13
13modified: 2024-06-24
14tags:
15 - attack.defense-evasion
16 - attack.t1070
17 - attack.t1562
18 - attack.t1562.002
19logsource:
20 product: windows
21 category: process_creation
22detection:
23 selection_img:
24 - Image|endswith: '\fltMC.exe'
25 - OriginalFileName: 'fltMC.exe'
26 selection_cli:
27 CommandLine|contains: 'unload'
28 filter_optional_avira:
29 ParentImage|startswith: 'C:\Users\'
30 ParentImage|contains: '\AppData\Local\Temp\'
31 ParentImage|endswith: '\endpoint-protection-installer-x64.tmp'
32 CommandLine|endswith: 'unload rtp_filesystem_filter'
33 filter_optional_manageengine:
34 ParentImage: 'C:\Program Files (x86)\ManageEngine\uems_agent\bin\dcfaservice64.exe'
35 CommandLine|endswith: 'unload DFMFilter'
36 condition: all of selection_* and not 1 of filter_optional_*
37falsepositives:
38 - Unknown
39level: medium
References
Related rules
- Sysmon Driver Unloaded Via Fltmc.EXE
- Potential Suspicious Activity Using SeCEdit
- AWS SecurityHub Findings Evasion
- Audit Policy Tampering Via Auditpol
- Audit Policy Tampering Via NT Resource Kit Auditpol