
Summary
This detection rule is focused on identifying instances where the Microsoft Software Licensing User Interface Tool (`slui.exe`) spawns a child process, an atypical behavior that could signify a User Account Control (UAC) bypass attempt. The detection leverages Endpoint Detection and Response (EDR) telemetry, specifically process creation events that have `slui.exe` as the parent process. The significance of this behavior lies in its potential to allow attackers to execute malicious code with elevated privileges, thus compromising system security and gaining unauthorized access. The rule employs data sources like Sysmon's EventID 1 and Windows Event Log Security 4688 to monitor such occurrences, allowing security teams to investigate and respond to possible threats effectively. The rule comes with provisions for common false positives, ensuring that legitimate applications that might spawn from `slui.exe` do not generate unnecessary alerts. Proper implementation requires necessary telemetry from EDR agents and compliance with the Splunk Common Information Model (CIM) for effective data normalization and analysis.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Windows Registry
- Process
- Windows Registry
ATT&CK Techniques
- T1548.002
- T1548
Created: 2024-12-10