Skip to content

<<< Hide Navigation Hide TOC >>>

Malicious Driver Load (05296024-fe8a-4baf-8f3d-9a5f5624ceb2)

Detects loading of known malicious drivers via their hash.

Galaxy ColorsAttack Pat...Sigma-Rule...
Rows: 3
Loading extensions...
Collapse filters
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators:
<, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx:
Learn more

TableFilter v0.7.2

https://www.tablefilter.com/
©2015-2025 Max Guglielmi
?
Cluster A Galaxy A Cluster B Galaxy B Level
Exploitation for Privilege Escalation - T1068 (b21c3b2d-02e6-45b1-980b-e69051040839) Attack Pattern Malicious Driver Load (05296024-fe8a-4baf-8f3d-9a5f5624ceb2) Sigma-Rules 1
Windows Service - T1543.003 (2959d63f-73fd-46a1-abd2-109d7dcede32) Attack Pattern Malicious Driver Load (05296024-fe8a-4baf-8f3d-9a5f5624ceb2) Sigma-Rules 1
Windows Service - T1543.003 (2959d63f-73fd-46a1-abd2-109d7dcede32) Attack Pattern Create or Modify System Process - T1543 (106c0cf6-bf73-4601-9aa8-0945c2715ec5) Attack Pattern 2