(YARA) Detect NtLoadDriver Usage
rule Detect_EventLogTampering: AntiForensic {
meta:
description = "Detect NtLoadDriver and other as anti-forensic"
author = "Unprotect"
comment = "Experimental rule"
strings:
$1 = "NtLoadDriver " fullword ascii
$2 = "NdrClientCall2" fullword ascii
condition:
uint16(0) == 0x5A4D and filesize < 1000KB and any of them
}
Associated Techniques
| Technique Name | Technique ID's | Categories | Snippet(s) |
|---|---|---|---|
| Windows Event Log Evasion via Native APIs | U0307 |
|
Matching Samples 10 most recent
| Sample Name | Matching Techniques | First Seen | Last Seen |
|---|---|---|---|
| loader_complete.exe | 10 | 2026-01-27 | 2 months ago |
| MS-RPRN.exe | 7 | 2025-03-12 | 1 year ago |
Created
June 27, 2022
Last Revised
March 27, 2026