598d29f811
chore: change tags, date, modified fields to comply with v2 of the Sigma spec. chore: update the related type from `obsoletes` to `obsolete`. chore: update local json schema to the latest version.
53 lines
2.6 KiB
YAML
53 lines
2.6 KiB
YAML
title: Potential Privileged System Service Operation - SeLoadDriverPrivilege
|
|
id: f63508a0-c809-4435-b3be-ed819394d612
|
|
status: test
|
|
description: |
|
|
Detects the usage of the 'SeLoadDriverPrivilege' privilege. This privilege is required to load or unload a device driver.
|
|
With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode.
|
|
This user right does not apply to Plug and Play device drivers.
|
|
If you exclude privileged users/admins and processes, which are allowed to do so, you are maybe left with bad programs trying to load malicious kernel drivers.
|
|
This will detect Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs) and the usage of Sysinternals and various other tools. So you have to work with a whitelist to find the bad stuff.
|
|
references:
|
|
- https://web.archive.org/web/20230331181619/https://blog.dylan.codes/evading-sysmon-and-windows-event-logging/
|
|
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4673
|
|
author: xknow (@xknow_infosec), xorxes (@xor_xes)
|
|
date: 2019-04-08
|
|
modified: 2023-01-20
|
|
tags:
|
|
- attack.defense-evasion
|
|
- attack.t1562.001
|
|
logsource:
|
|
product: windows
|
|
service: security
|
|
detection:
|
|
selection_1:
|
|
EventID: 4673
|
|
PrivilegeList: 'SeLoadDriverPrivilege'
|
|
Service: '-'
|
|
filter_exact:
|
|
ProcessName:
|
|
- 'C:\Windows\System32\Dism.exe'
|
|
- 'C:\Windows\System32\rundll32.exe'
|
|
- 'C:\Windows\System32\fltMC.exe'
|
|
- 'C:\Windows\HelpPane.exe'
|
|
- 'C:\Windows\System32\mmc.exe'
|
|
- 'C:\Windows\System32\svchost.exe'
|
|
- 'C:\Windows\System32\wimserv.exe'
|
|
- 'C:\Windows\System32\RuntimeBroker.exe'
|
|
- 'C:\Windows\System32\SystemSettingsBroker.exe'
|
|
- 'C:\Windows\explorer.exe'
|
|
filter_endswith:
|
|
ProcessName|endswith:
|
|
- '\procexp64.exe'
|
|
- '\procexp.exe'
|
|
- '\procmon64.exe'
|
|
- '\procmon.exe'
|
|
- '\Google\Chrome\Application\chrome.exe'
|
|
- '\AppData\Local\Microsoft\Teams\current\Teams.exe'
|
|
filter_startswith:
|
|
ProcessName|startswith: 'C:\Program Files\WindowsApps\Microsoft'
|
|
condition: selection_1 and not 1 of filter_*
|
|
falsepositives:
|
|
- Other legimate tools loading drivers. Including but not limited to, Sysinternals, CPU-Z, AVs etc. A baseline needs to be created according to the used products and allowed tools. A good thing to do is to try and exclude users who are allowed to load drivers.
|
|
level: medium
|