a8e1ecd658
chore: promote older rules status from experimental to test Co-authored-by: nasbench <nasbench@users.noreply.github.com>
23 lines
672 B
YAML
23 lines
672 B
YAML
title: Windows Kernel Debugger Execution
|
|
id: 27ee9438-90dc-4bef-904b-d3ef927f5e7e
|
|
status: test
|
|
description: Detects execution of the Windows Kernel Debugger "kd.exe".
|
|
references:
|
|
- Internal Research
|
|
author: Nasreddine Bencherchali (Nextron Systems)
|
|
date: 2023/05/15
|
|
tags:
|
|
- attack.defense_evasion
|
|
- attack.privilege_escalation
|
|
logsource:
|
|
category: process_creation
|
|
product: windows
|
|
detection:
|
|
selection:
|
|
- Image|endswith: '\kd.exe'
|
|
- OriginalFileName: 'kd.exe'
|
|
condition: selection
|
|
falsepositives:
|
|
- Rare occasions of legitimate cases where kernel debugging is necessary in production. Investigation is required
|
|
level: high
|