Sysmon Driver Unload via fltMC.exe
Detection of the Sysmon filter driver being unloaded via `fltMC.exe`, which can blind security monitoring and allow malicious actions to go undetected.
Attackers may attempt to disable or uninstall security tools like Sysmon to evade detection and hide malicious activities on a compromised system. This is achieved by unloading the Sysmon filter driver using fltMC.exe, a legitimate Windows utility. Once Sysmon is disabled, adversaries can execute further attacks without being logged, potentially leading to data breaches, privilege escalation, or persistent access within the environment. This technique is significant because it directly impacts the visibility and effectiveness of security monitoring.
Attack Chain
- The attacker gains initial access to the system through various means (e.g., compromised credentials, exploiting vulnerabilities, or social engineering).
- The attacker escalates privileges if necessary to gain administrative rights on the system.
- The attacker uses
fltMC.exeto unload the Sysmon filter driver (SysmonDrv). The command executed is typicallyfltMC.exe unload SysmonDrv. - The operating system processes the
fltMC.execommand, removing the Sysmon filter driver from the system. - Sysmon ceases to collect event data as its driver is no longer active.
- The attacker executes malicious commands, scripts, or binaries without being logged by Sysmon.
- The attacker establishes persistence, moves laterally, exfiltrates data, or achieves other objectives without Sysmon alerting.
Impact
Successful unloading of the Sysmon driver allows attackers to operate without being detected by Sysmon. This can lead to a complete loss of visibility into attacker activities, enabling data breaches, privilege escalation, and persistent access. The impact is significant as it directly undermines the effectiveness of security monitoring and incident response capabilities.
Recommendation
- Deploy the Sigma rule
Sysmon Driver Unload via FltMC.exeto detect the execution offltMC.exewith theunloadandSysmonDrvparameters. - Enable Sysmon process creation logging (Event ID 1) to ensure the required data is available for detection.
- Investigate any instances of
fltMC.exebeing used to unload drivers, especially if the parent process is suspicious. - Consider implementing host-based intrusion prevention system (HIPS) rules to prevent the execution of
fltMC.exeor restrict its usage to authorized administrators.
Detection coverage 2
Sysmon Driver Unload via FltMC.exe
highDetects the use of fltMC.exe to unload the Sysmon filter driver.
Suspicious Parent Process of fltMC.exe
mediumDetects suspicious parent processes executing fltMC.exe, which could indicate malicious activity related to disabling the Sysmon driver.
Detection queries are kept inside the platform. Get full rules →