Detection rules › Sigma

Devcon Execution Disabling VMware VMCI Device

Severity
high
Author
Matt Anderson, Dray Agha, Anna Pham (Huntress)
Source
upstream

Detects execution of devcon.exe with commands that disable the VMware Virtual Machine Communication Interface (VMCI) device. This can be legitimate during VMware Tools troubleshooting or driver conflicts, but may also indicate malware attempting to hijack communication with the hardware via the VMCI device. This has been used to facilitate VMware ESXi vulnerability exploits to escape VMs and execute code on the ESXi host.

MITRE ATT&CK coverage

TacticTechniques
PersistenceT1543.003 Create or Modify System Process: Windows Service
Privilege EscalationT1543.003 Create or Modify System Process: Windows Service
Defense EvasionT1562.001 Impair Defenses: Disable or Modify Tools

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: all of selection_img

or:
Image|endswith: '\devcon.exe'
OriginalFileName: DevCon.exe

Stage 2: all of selection_action

CommandLine|contains: ' disable '

Stage 3: all of selection_vmci_pci

or:
CommandLine|contains: '15AD&DEV_0740'
CommandLine|contains: VMWVMCIHOSTDEV

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • disable
  • 15AD&DEV_0740
  • VMWVMCIHOSTDEV
Imageends_with
  • \devcon.exe
OriginalFileNameeq
  • DevCon.exe