
Summary
This detection rule identifies attempts to execute a UAC (User Account Control) bypass exploiting a path parsing vulnerability in the Windows System Assessment Tool (winsat.exe). The rule is based on the specific characteristics of the registry activity associated with this technique, particularly focusing on the creation of registry keys that appear to point to a legitimate path but actually lead to a malicious payload. The detection logic specifically looks for registry operations involving a target object containing the winsat.exe executable within a particular directory structure associated with user-level execution, combined with conditions that indicate the execution of the malicious payload under misleading object names. The technique is categorized under attack methods for privilege escalation and defense evasion, specifically aligned with the MITRE ATT&CK framework technique T1548.002, making this rule vital for identifying nefarious attempts to bypass Windows privileges and escalate privileges silently.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2021-08-30