Detection rules › Sigma

Suspicious Service Installed

Severity
medium
Author
xknow (@xknow_infosec), xorxes (@xor_xes)
Source
upstream

Detects installation of NalDrv or PROCEXP152 services via registry-keys to non-system32 folders. Both services are used in the tool Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs), which uses KDU (https://github.com/hfiref0x/KDU)

MITRE ATT&CK coverage

TacticTechniques
Defense EvasionT1562.001 Impair Defenses: Disable or Modify Tools

Event coverage

ProviderEvent IDTitle
Sysmon13RegistryEvent (Value Set)

Stages and Predicates

Stage 1: selection

TargetObject: ['HKLM\System\CurrentControlSet\Services\NalDrv\ImagePath', 'HKLM\System\CurrentControlSet\Services\PROCEXP152\ImagePath']

Stage 2: not filter

or:
Image|endswith: '\handle.exe'
Image|endswith: '\handle64.exe'
Image|endswith: '\procexp.exe'
Image|endswith: '\procexp64.exe'
Image|endswith: '\procmon.exe'
Image|endswith: '\procmon64.exe'
Details|contains: '\WINDOWS\system32\Drivers\PROCEXP152.SYS'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
Detailsmatch
  • \WINDOWS\system32\Drivers\PROCEXP152.SYS
Imageends_with
  • \handle.exe corpus 5 (sigma 5)
  • \handle64.exe corpus 5 (sigma 5)
  • \procexp.exe corpus 6 (sigma 6)
  • \procexp64.exe corpus 6 (sigma 6)
  • \procmon.exe corpus 2 (sigma 2)
  • \procmon64.exe corpus 2 (sigma 2)
TargetObjecteq
  • HKLM\System\CurrentControlSet\Services\NalDrv\ImagePath
  • HKLM\System\CurrentControlSet\Services\PROCEXP152\ImagePath