heroui logo

UAC Bypass Using Consent and Comctl32 - File

Sigma Rules

View Source
Summary
This detection rule identifies attempts to bypass User Account Control (UAC) on Windows using a technique that involves 'consent.exe' and 'comctl32.dll'. UAC is a security feature in Windows that helps prevent unauthorized changes to the operating system, and bypassing it is often a preliminary step in privilege escalation attacks. The selected pattern specifically looks for instances where the 'TargetFilename' indicates invocation of 'consent.exe' from the System32 directory, paired with the 'comctl32.dll' file. The detection leverages the structure of the file paths to ascertain potentially malicious activities relevant to the UAC bypass technique documented in the UACMe project.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
Created: 2021-08-23