atomic-threat-coverage/detection_rules/sysmon_susp_driver_load.yml
2019-02-12 04:55:11 +01:00

15 lines
402 B
YAML
Executable File

title: Suspicious Driver Load from Temp
description: Detects a driver load from a temporary directory
author: Florian Roth
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 6
ImageLoaded: '*\Temp\*'
condition: selection
falsepositives:
- there is a relevant set of false positives depending on applications in the environment
level: medium