Skip to content

Commit bc0891b

Browse files
authored
Update with Warning on driver
1 parent 5ed21e1 commit bc0891b

1 file changed

Lines changed: 20 additions & 1 deletion

File tree

file-delete.md

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
File Delete
22
===========
33

4-
Via its filter driver, Sysmon can log the creation of files and information on what process is deleting of overwriting the file using **EventID 23**. This allows a defender to filter for:
4+
On version 11.0 of Sysmon the capability to log file deletions was added, in addition file marked for deletion are archived allowing defentders to collect tools and other files an attacker creates on a system to better track and understand their activiries. Sysmon relies on its filter driver, Sysmon can log the creation of files and information on what process is deleting or overwriting the file using **EventID 23**. Defender can use this event type to filter for:
55

66
* Dropper / stager that removes itself after execution (T1193 or T1064 and loads more) or attackers doing it manually
77

@@ -11,6 +11,9 @@ Via its filter driver, Sysmon can log the creation of files and information on w
1111

1212
![minifilter](./media/image36.png)
1313

14+
The minidriver monitors for three I/O request packets (IRP) IRP_MJ_CREATE, IRP_MJ_CLEANUP, and IRP_MJ_WRITE for file creates, complete handle closes, and writes respectively.
15+
16+
1417
### Archive directory
1518

1619
By default this folder is set to Sysmon if no folder is specified during installation and specified either in the configuration either in config file with the ```<ArchiveDirectory>``` setting in XML configurations file or via the registry by setting the registry key value **FilterArchiveDirectory** under the driver registry key paramaters.
@@ -74,3 +77,19 @@ Example monitoring for script file creation by extension:
7477
</EventFiltering>
7578
</Sysmon>
7679
```
80+
81+
### Warning
82+
83+
A code execution vulnerability exits on Sysmon 11.0, 11.1 and 12.0 where an attacker that has local administrative privileges can leverage a bug in the way that Sysmon handles File Delete events in its memory allows for arbitrary kernel write where an attacker can write executacle code and run it with kernel level privileges.
84+
85+
SHA1 hashes for vulnerables version of the drivers are:
86+
87+
* 35c67ac6cb0ade768ccf11999b9aaf016ab9ae92fb51865d73ec1f7907709dca
88+
* d2ed01cce3e7502b1dd8be35abf95e6e8613c5733ee66e749b972542495743b8
89+
* a86e063ac5214ebb7e691506a9f877d12b7958e071ecbae0f0723ae24e273a73
90+
* c0640d0d9260689b1c6c63a60799e0c8e272067dcf86847c882980913694543a
91+
* 2a5e73343a38e7b70a04f1b46e9a2dde7ca85f38a4fb2e51e92f252dad7034d4
92+
* 98660006f0e923030c5c5c8187ad2fe1500f59d32fa4d3286da50709271d0d7f
93+
* 7e1d7cfe0bdf5f17def755ae668c780dedb027164788b4bb246613e716688840
94+
95+
Using a SIEM one can monitor for this hashes using Sysmon Event ID 6 for driver loads. Also access to the sysmon service executable should be monitor for SourceImage and GrantedAccess masks not seen before.

0 commit comments

Comments
 (0)