
Summary
This rule detects attempts to bypass User Account Control (UAC) through a vulnerability in the Windows Tools for Reliability, specifically using 'winsat.exe'. The path parsing flaw allows malicious actors to execute code with elevated privileges by manipulating process creation. The rule identifies high integrity-level processes that have a parent-child relationship with 'winsat.exe' located in a Temp directory. The detection criteria include specific integrity levels and certain substrings in the command-line execution path. It aims to thwart privilege escalation attacks categorized under 'attack.privilege-escalation'.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2021-08-30