Files
hayabusa/rules/Sigma/driver_load_windivert.yml
2021-11-14 11:00:56 +09:00

33 lines
946 B
YAML

title: WinDivert Driver Load
author: Florian Roth
date: 2021/07/30
description: Detects the load of the Windiver driver, a powerful user-mode capture/sniffing/modification/blocking/re-injection
package for Windows
detection:
SELECTION_1:
EventID: 6
SELECTION_2:
ImageLoaded: '*\WinDivert.sys*'
SELECTION_3:
ImageLoaded: '*\WinDivert64.sys*'
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3))
falsepositives:
- legitimate WinDivert driver usage
id: 679085d5-f427-4484-9f58-1dc30a7c426d
level: high
logsource:
category: driver_load
product: windows
references:
- https://reqrypt.org/windivert-doc.html
- https://rastamouse.me/ntlm-relaying-via-cobalt-strike/
status: experimental
tags:
- attack.collection
- attack.defense_evasion
- attack.t1599.001
- attack.t1557.001
yml_filename: driver_load_windivert.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/driver_load