heroui logo

Potential fodhelper UAC Bypass Attempt

Anvilogic Forge

View Source
Summary
This rule is designed to detect potential User Account Control (UAC) bypass attempts involving the fodhelper component on Windows systems. UAC is a security feature in Windows that helps prevent unauthorized changes to the operating system by requiring user consent before allowing processes to elevate their privileges. Adversaries might exploit certain mechanisms to circumvent this control and gain higher privileges without the necessary user prompts. The detection logic specifically monitors the creation of registry keys that are associated with known techniques to exploit fodhelper for this purpose, thus indicating a potential security threat. The detection is implemented using Splunk querying against endpoint data to identify pertinent event codes and registry actions indicative of a UAC bypass. The event codes under watch include 4103 and 4104, which are typical for PowerShell activity related to item creation and modification. This rule is proactive in identifying privilege escalation attempts over the Windows environment through specific PowerShell logs, leveraging ties to recognized tactics and techniques outlined in threat intelligence frameworks.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Application Log
  • User Account
ATT&CK Techniques
  • T1548.002
Created: 2024-02-09