heroui logo

Potential Exploitation of an Unquoted Service Path Vulnerability

Elastic Detection Rules

View Source
Summary
The rule 'Potential Exploitation of an Unquoted Service Path Vulnerability' aims to detect potential privilege escalation attempts through unquoted service paths in Windows. Adversaries may exploit this vulnerability by placing a malicious executable in a directory that is prioritized by Windows when launching services. This detection rule leverages various data sources like Microsoft Defender for Endpoint and SentinelOne to monitor process activities. It applies a query that captures processes where the executable path matches common unquoted path patterns, which may signal an attempt to execute unauthorized code. The rule includes guidance for investigation, false positive analysis, and response measures for identified threats. Detailed analysis steps are provided for verifying suspicious process activities, as well as remediation steps for containing and eliminating the threat.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • User Account
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1574
  • T1574.009
Created: 2023-07-13