(YARA) YARA_Detect_EventLogTampering

Download Raw

rule Detect_EventLogTampering: AntiForensic {
    meta: 
        description = "Detect NtLoadDriver and other as anti-forensic"
        author = "Unprotect"
        comment = "Experimental rule"
    strings:
        $1 = "NtLoadDriver " fullword ascii
        $2 = "NdrClientCall2" fullword ascii
    condition:   
       uint16(0) == 0x5A4D and filesize < 1000KB and any of them 
}

Associated Techniques

Technique Name Technique ID's Snippet(s) OS
Windows Event Log Evasion via Native APIs U0307

Matching Samples 10 most recent

Sample Name Matching Techniques First Seen Last Seen
MS-RPRN.exe 7 2025-03-12 2 weeks, 6 days ago
View All

Created

June 27, 2022

Last Revised

June 27, 2022