Skip to content

Drivers List

Evidence: Drivers List
Description: Collect driver list
Category: System
Platform: windows
Short Name: dri
Is Parsed: Yes
Sent to Investigation Hub: Yes
Collect File(s): No

Kernel drivers are privileged software components that run in kernel mode with full access to system memory and hardware. They are used for device drivers, file system filters, security software, and system utilities.

Malicious drivers (rootkits) can hide processes, files, network connections, and other artifacts from user-mode tools. Enumerating loaded drivers is critical for detecting kernel-level threats and understanding the system’s low-level software stack.

This collector gathers structured data about drivers list.

FieldDescriptionExample
FilePathFull path to the driver fileC:\Windows\System32\drivers\ntfs.sys
FileNameDriver file namentfs.sys
FileSizeSize of the driver file1048576
FileModifiedLast modified timestamp2023-10-15T14:30:00
FileAccessedLast accessed timestamp2023-10-15T15:45:00
FileCreatedCreation timestamp2023-10-01T10:00:00
HashHash of the driver fileSHA256:a1b2c3…
SignatureDigital signature informationMicrosoft Windows
SignatureValidWhether signature is validTRUE
BaseAddressMemory address where driver is loaded0xFFFFF80012340000
SizeSize of loaded driver in memory1048576

This collector uses IOCTL calls to enumerate loaded kernel modules and retrieves detailed information about each driver.

Driver enumeration is essential for detecting rootkits and kernel-level malware. Investigators use this data to identify unsigned or suspicious drivers, detect kernel-mode persistence, validate system integrity, identify outdated or vulnerable drivers, and detect malicious kernel modules. The memory addresses and load order can reveal driver injection or manipulation attempts.