yara/rules/Windows_VulnDriver_ProcId.yar (19 lines of code) (raw):

rule Windows_VulnDriver_ProcId_86605fa9 { meta: author = "Elastic Security" id = "86605fa9-bf1a-4c2c-87f5-cb656ebe4cf3" fingerprint = "6d8d926efd98d6eaa1d06d39fb5babf70abf6f0e639fb74f29f65836a79e4743" creation_date = "2022-04-04" last_modified = "2022-04-04" threat_name = "Windows.VulnDriver.ProcId" reference_sample = "b03f26009de2e8eabfcf6152f49b02a55c5e5d0f73e01d48f5a745f93ce93a29" severity = 50 arch_context = "x86" scan_context = "file" license = "Elastic License v2" os = "windows" strings: $str1 = "\\piddrv64.pdb" condition: int16(uint32(0x3C) + 0x5c) == 0x0001 and $str1 }