1
1
name : Windows Driver Load Non-Standard Path
2
2
id : 9216ef3d-066a-4958-8f27-c84589465e62
3
- version : 7
4
- date : ' 2025-05-02 '
3
+ version : 8
4
+ date : ' 2025-09-23 '
5
5
author : Michael Haag, Splunk
6
6
status : production
7
7
type : TTP
@@ -14,36 +14,50 @@ description: The following analytic detects the loading of new Kernel Mode Drive
14
14
escalate privileges, or maintain persistence within the environment, posing a severe
15
15
threat to system integrity and security.
16
16
data_source :
17
- - Windows Event Log System 7045
17
+ - Windows Event Log System 7045
18
18
search : >-
19
- `wineventlog_system` EventCode=7045 ServiceType="kernel mode driver"
20
- | regex ImagePath!="(?i)^(\w:\\\\Windows\\\\|\w:\\\\Program\sFile|\\\\systemroot\\\\|%SystemRoot%|system32\\\\|\\\\ProgramData\\\\Microsoft\\\\Windows\sDefender\\\\Definition\sUpdates\\\\)"
21
- | stats count min(_time) as firstTime max(_time) as lastTime by Computer EventCode
22
- ImagePath ServiceName ServiceType | rename Computer as dest | `security_content_ctime(firstTime)` |
23
- `security_content_ctime(lastTime)` | `windows_driver_load_non_standard_path_filter`
24
- how_to_implement : To implement this analytic, the Windows EventCode 7045 will need
25
- to be logged. The Windows TA for Splunk is also recommended.
26
- known_false_positives : False positives may be present based on legitimate third party
27
- applications needing to install drivers. Filter, or allow list known good drivers
28
- consistently being installed in these paths.
19
+ `wineventlog_system`
20
+ EventCode = 7045
21
+ ServiceType = "kernel mode driver"
22
+ | regex ImagePath != "(?i)^(
23
+ \w:\\\\Program Files\\\\|
24
+ \w:\\\\Program Files (x86)\\\\|
25
+ \w:\\\\Windows\\\\System32\\\\|
26
+ \w:\\\\Windows\\\\SysWOW64\\\\|
27
+ \w:\\\\ProgramData\\\\Microsoft\\\\Windows Defender\\\\Definition Updates\\\\|
28
+ \w:\\\\ProgramData\\\\Microsoft\\\\Windows Defender\\\\Platform\\\\|
29
+ %SystemRoot%|
30
+ )"
31
+ | stats count min(_time) as firstTime max(_time) as lastTime by
32
+ Computer EventCode ImagePath ServiceName ServiceType
33
+ | rename Computer as dest
34
+ | `security_content_ctime(firstTime)`
35
+ | `security_content_ctime(lastTime)`
36
+ | `windows_driver_load_non_standard_path_filter`
37
+ how_to_implement : |
38
+ To implement this analytic, the Windows EventCode 7045 will need to be logged.
39
+ The Windows TA for Splunk is also recommended.
40
+ known_false_positives : |
41
+ False positives may be present based on legitimate third party applications needing to install drivers.
42
+ Filter, or allow list known good drivers consistently being installed in these paths.
29
43
references :
30
- - https://redcanary.com/blog/tracking-driver-inventory-to-expose-rootkits/
31
- - https://attack.mitre.org/techniques/T1014/
32
- - https://www.fuzzysecurity.com/tutorials/28.html
44
+ - https://redcanary.com/blog/tracking-driver-inventory-to-expose-rootkits/
45
+ - https://attack.mitre.org/techniques/T1014/
46
+ - https://www.fuzzysecurity.com/tutorials/28.html
33
47
drilldown_searches :
34
- - name : View the detection results for - "$dest$"
35
- search : ' %original_detection_search% | search dest = "$dest$"'
36
- earliest_offset : $info_min_time$
37
- latest_offset : $info_max_time$
38
- - name : View risk events for the last 7 days for - "$dest$"
39
- search : ' | from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest$")
40
- starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime
41
- values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories)
42
- as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic)
43
- as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)`
44
- | `security_content_ctime(lastTime)`'
45
- earliest_offset : $info_min_time$
46
- latest_offset : $info_max_time$
48
+ - name : View the detection results for - "$dest$"
49
+ search : ' %original_detection_search% | search dest = "$dest$"'
50
+ earliest_offset : $info_min_time$
51
+ latest_offset : $info_max_time$
52
+ - name : View risk events for the last 7 days for - "$dest$"
53
+ search : ' | from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest$")
54
+ starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime
55
+ values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories)
56
+ as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic)
57
+ as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)`
58
+ | `security_content_ctime(lastTime)`'
59
+ earliest_offset : $info_min_time$
60
+ latest_offset : $info_max_time$
47
61
rba :
48
62
message : A kernel mode driver was loaded from a non-standard path on $dest$.
49
63
risk_objects :
53
67
threat_objects : []
54
68
tags :
55
69
analytic_story :
56
- - Windows Drivers
57
- - CISA AA22-320A
58
- - AgentTesla
59
- - BlackByte Ransomware
60
- - BlackSuit Ransomware
70
+ - Windows Drivers
71
+ - CISA AA22-320A
72
+ - AgentTesla
73
+ - BlackByte Ransomware
74
+ - BlackSuit Ransomware
61
75
asset_type : Endpoint
62
76
mitre_attack_id :
63
- - T1014
64
- - T1068
77
+ - T1014
78
+ - T1068
65
79
product :
66
- - Splunk Enterprise
67
- - Splunk Enterprise Security
68
- - Splunk Cloud
80
+ - Splunk Enterprise
81
+ - Splunk Enterprise Security
82
+ - Splunk Cloud
69
83
security_domain : endpoint
70
84
tests :
71
- - name : True Positive Test
72
- attack_data :
73
- - data :
74
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1068/drivers/xml7045_windows-system.log
75
- source : XmlWinEventLog:System
76
- sourcetype : XmlWinEventLog
85
+ - name : True Positive Test
86
+ attack_data :
87
+ - data :
88
+ https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1068/drivers/xml7045_windows-system.log
89
+ source : XmlWinEventLog:System
90
+ sourcetype : XmlWinEventLog
0 commit comments