Skip to content

Hide Navigation Hide TOC

Kernel Module Load (23e4ee78-26f3-4fcf-ba43-ab953962f96c)

The process of loading a kernel module into the operating system kernel. Kernel modules are object files that extend the kernel’s functionality, such as adding support for device drivers, new filesystems, or additional system calls. This action can be legitimate (e.g., loading a driver) or malicious (e.g., adding a rootkit).

Data Collection Measures:

  • Linux:
    • Auditd: Enable auditing of kernel module loading. Example rule: -a always,exit -F arch=b64 -S init_module,delete_module.
    • Syslog: Monitor /var/log/syslog or /var/log/messages for entries related to kernel module loads.
    • Systemd Journal: Use journalctl to query logs for module loading events: journalctl -k | grep "Loading kernel module"
  • macOS:
    • Unified Logs: Use the log command to query kernel module events: log show --predicate 'eventMessage contains "kextload"' --info
    • Endpoint Security Framework (ESF): Monitor for ES_EVENT_TYPE_AUTH_KEXTLOAD (kernel extension loading events).
  • Kernel-Specific Tools:
    • Lsmod: Use lsmod to list loaded kernel modules in real-time.
    • Kprobe/eBPF: Use extended Berkeley Packet Filter (eBPF) or Kernel Probes (kprobes) to monitor kernel events, including module loading. Example using eBPF tools like BCC: sudo python /path/to/bcc/tools/kprobe -v do_init_module
  • Enable EDR Monitoring:
    • Configure alerts for: Suspicious kernel module loads from non-standard paths (e.g., /tmp). Unexpected or unsigned kernel modules.
    • Review detailed telemetry data provided by the EDR for insight into who initiated the module load, the file path, and whether the module was signed.
Cluster A Galaxy A Cluster B Galaxy B Level
Kernel Module Load (23e4ee78-26f3-4fcf-ba43-ab953962f96c) mitre-data-component Kernel Modules and Extensions - T1547.006 (a1b52199-c8c5-438a-9ded-656f1d0888c6) Attack Pattern 1
Escape to Host - T1611 (4a5b7ade-8bb5-4853-84ed-23f262002665) Attack Pattern Kernel Module Load (23e4ee78-26f3-4fcf-ba43-ab953962f96c) mitre-data-component 1
Kernel Module Load (23e4ee78-26f3-4fcf-ba43-ab953962f96c) mitre-data-component Boot or Logon Autostart Execution - T1547 (1ecb2399-e8ba-4f6b-8ba7-5c27d49405cf) Attack Pattern 1
Boot or Logon Autostart Execution - T1547 (1ecb2399-e8ba-4f6b-8ba7-5c27d49405cf) Attack Pattern Kernel Modules and Extensions - T1547.006 (a1b52199-c8c5-438a-9ded-656f1d0888c6) Attack Pattern 2