Detectionmediumtest
Process Monitor Driver Creation By Non-Sysinternals Binary
Detects creation of the Process Monitor driver by processes other than Process Monitor (procmon) itself.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Nasreddine Bencherchali (Nextron Systems)Created Fri May 05a05baa88-e922-4001-bc4d-8738135f27dewindows
Log Source
WindowsFile Event
ProductWindows← raw: windows
CategoryFile Event← raw: file_event
Events for file system activity including creation, modification, and deletion.
Detection Logic
Detection Logic2 selectors
detection:
selection:
TargetFilename|contains: '\procmon'
TargetFilename|endswith: '.sys'
filter_main_process_explorer:
Image|endswith:
- '\procmon.exe'
- '\procmon64.exe'
condition: selection and not 1 of filter_main_*False Positives
Some false positives may occur with legitimate renamed process monitor binaries
References
1
Resolving title…
Internal ResearchMITRE ATT&CK
Rule Metadata
Rule ID
a05baa88-e922-4001-bc4d-8738135f27de
Status
test
Level
medium
Type
Detection
Created
Fri May 05
Path
rules/windows/file/file_event/file_event_win_sysinternals_procmon_driver_susp_creation.yml
Raw Tags
attack.persistenceattack.privilege-escalationattack.t1068