heroui logo

UAC Bypass Using Windows Media Player - File

Sigma Rules

View Source
Summary
This rule aims to detect a potential UAC (User Account Control) bypass associated with the misuse of Windows Media Player through the 'osksupport.dll' file. Specifically, it identifies an attack scenario where this DLL file is leveraged to facilitate elevation of privileges in a Windows environment. The detection logic focuses on monitoring specific file events: it looks for files that start with the user directory and end with '\AppData\Local\Temp\OskSupport.dll'. Additionally, it matches events related to 'DllHost.exe' while targeting the legitimate 'osk.exe' executable within the Windows Media Player directory. The rule highlights the nefarious intention to misuse 'osk.exe' as a vector for executing untrusted code. As such, it is classified under several attack tactics such as defense evasion and privilege escalation. By combining these file path criteria, the system can filter and flag any suspicious activity indicative of this UAC bypass technique.
Categories
  • Windows
  • Endpoint
  • Application
Data Sources
  • File
Created: 2021-08-23