Detection rules › Sigma

Windows Pcap Drivers

Severity
medium
Author
Cian Heasley
Source
upstream

Detects Windows Pcap driver installation based on a list of associated .sys files.

MITRE ATT&CK coverage

TacticTechniques
Credential AccessT1040 Network Sniffing
DiscoveryT1040 Network Sniffing

Event coverage

ProviderEvent IDTitle
Security-Auditing4697A service was installed in the system.

Stages and Predicates

Stage 1: selection

or:
ServiceFileName|contains: USBPcap
ServiceFileName|contains: ndiscap
ServiceFileName|contains: nm3
ServiceFileName|contains: nmnt
ServiceFileName|contains: npcap
ServiceFileName|contains: npf
ServiceFileName|contains: pcap
ServiceFileName|contains: pktmon
ServiceFileName|contains: windivert

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
ServiceFileNamematch
  • USBPcap
  • ndiscap
  • nm3
  • nmnt
  • npcap
  • npf
  • pcap
  • pktmon
  • windivert

Neighbors

Broader alternatives (more inclusive than this rule)

These rules match a superset of what this rule catches. They cover the same events plus more. Use them if you want wider coverage and can absorb more false positives.