Detection rules › Sigma
Suspicious Service Installed
Detects installation of NalDrv or PROCEXP152 services via registry-keys to non-system32 folders. Both services are used in the tool Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs), which uses KDU (https://github.com/hfiref0x/KDU)
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Defense Evasion | T1562.001 Impair Defenses: Disable or Modify Tools |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 13 | RegistryEvent (Value Set) |
Stages and Predicates
Stage 1: selection
TargetObject: ['HKLM\System\CurrentControlSet\Services\NalDrv\ImagePath', 'HKLM\System\CurrentControlSet\Services\PROCEXP152\ImagePath']
Stage 2: not filter
or:
Image|endswith: '\handle.exe'
Image|endswith: '\handle64.exe'
Image|endswith: '\procexp.exe'
Image|endswith: '\procexp64.exe'
Image|endswith: '\procmon.exe'
Image|endswith: '\procmon64.exe'
Details|contains: '\WINDOWS\system32\Drivers\PROCEXP152.SYS'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
Details | match |
|
Image | ends_with |
|
TargetObject | eq |
|