heroui logo

Potential Privilege Escalation via InstallerFileTakeOver

Elastic Detection Rules

View Source
Summary
The rule titled 'Potential Privilege Escalation via InstallerFileTakeOver' is designed to detect attempts that exploit the CVE-2021-41379 vulnerability through a proof of concept (PoC). This vulnerability allows unprivileged users to escalate their privileges to that of the SYSTEM account. The detection criteria hinge on the behavior of the 'elevation_service.exe' which, upon exploitation, has its DACL (Discretionary Access Control List) overwritten, allowing further actions to take place in the system's context. The rule utilizes EQL (Elastic Query Language) to monitor process executions on Windows endpoints for suspicious activity indicating this form of escalation. It notably focuses on processes executing 'elevation_service.exe' under certain conditions, not only checking for known bad signatures but also examining parent processes. Triage steps involve analyzing the execution chain, registry modifications, and DNS queries to identify dubious behavior associated with the exploitation attempt. The rule's high severity score reflects the potential impact of successful exploits. Linear investigations include checking for previous alerts, analyzing network communications, and verifying digital signatures of executables involved. A response protocol is outlined for isolation, removal of detected threats, and remediation steps including incident response tactics and password resets.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Image
  • Application Log
ATT&CK Techniques
  • T1068
Created: 2021-11-25