
Summary
This detection rule focuses on identifying unauthorized modifications to the Windows registry, specifically targeting the EnableLUA setting, which is part of the User Account Control (UAC) mechanism in Windows. UAC is designed to help prevent malicious software from compromising the system by requiring administrative approval for actions that require elevated privileges. Attackers may attempt to alter the EnableLUA registry value to bypass UAC and gain higher-level access without user consent. The rule leverages event codes 4657 (Registry value modified) and 4688 (Process creation) to capture instances where processes may modify the EnableLUA setting in the registry. By monitoring these specific event logs and looking for changes in the EnableLUA setting, security teams can detect potential privilege escalation attempts before they can be exploited.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1548.002
- T1548
Created: 2024-02-09