
Summary
The rule named 'Persistence via Update Orchestrator Service Hijack' detects potential attempts by adversaries to hijack the Windows Update Orchestrator Service (UsoSvc) for establishing persistence with elevated privileges (SYSTEM level). This rule is pertinent due to a known vulnerability that allows any user to escalate their privileges to local system. This vulnerability was patched by Microsoft in June 2020 but still presents a risk if attackers exploit improperly authorized service calling mechanisms. The EQL query focuses on processes spawned by 'svchost.exe' utilizing the UsoSvc command-line parameters, specifically looking for uncommon instances that deviate from expected behavior. The rule advises on comprehensive investigation steps including examination of the process tree, associated processes, anomaly detection in behavior, and scanning of files against established malware detection services like VirusTotal. Proper incident response measures are recommended including isolation of affected hosts and thorough analysis to prevent further intrusions.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Service
- Network Traffic
- Application Log
ATT&CK Techniques
- T1543
- T1543.003
- T1068
- T1574
Created: 2020-08-17