Detectionhightest
CodeIntegrity - Unsigned Image Loaded
Detects loaded unsigned image on the system
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Nasreddine Bencherchali (Nextron Systems)Created Tue Jun 06c92c24e7-f595-493f-9c98-53d5142f5c18windows
Log Source
Windowscodeintegrity-operational
ProductWindows← raw: windows
Servicecodeintegrity-operational← raw: codeintegrity-operational
Detection Logic
Detection Logic1 selector
detection:
selection:
EventID: 3037 # Code Integrity determined an unsigned image %2 is loaded into the system. Check with the publisher to see if a signed version of the image is available.
condition: selectionFalse Positives
Unlikely
False positives are unlikely for most environments. High confidence detection.
References
12
Resolving title…
learn.microsoft.comResolving title…
learn.microsoft.com3
Resolving title…
Internal ResearchMITRE ATT&CK
Rule Metadata
Rule ID
c92c24e7-f595-493f-9c98-53d5142f5c18
Status
test
Level
high
Type
Detection
Created
Tue Jun 06
Path
rules/windows/builtin/code_integrity/win_codeintegrity_unsigned_image_loaded.yml
Raw Tags
attack.privilege-escalation