
Summary
This detection rule monitors for the execution of programs via pcalua.exe, the Microsoft Windows Program Compatibility Assistant. It leverages process and parent process information gathered from Endpoint Detection and Response (EDR) agents, specifically focusing on command execution that might evade standard protections. The use of pcalua.exe can be indicative of an attacker attempting to exploit a system by circumventing command line execution restrictions. If such activity is detected, it could lead to unauthorized command execution, privilege escalation, or persistent threats within the system. The rule is particularly effective when integrated with logs from Sysmon, Windows Event Log Security, and other EDR solutions, enabling rapid identification of potential threats originating from indirect command execution techniques.
Categories
- Endpoint
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1202
Created: 2024-11-13