
Summary
This detection rule aims to identify attempts to bypass User Account Control (UAC) on Windows through the exploitation of changepk.exe in conjunction with slui.exe. UAC is a security feature in Windows designed to prevent unauthorized changes to the operating system, and bypassing it can lead to privilege escalation vulnerabilities. The rule specifically monitors processes where changepk.exe is launched with slui.exe as the parent process and checks for certain integrity levels indicative of high or system privileges that could signify malicious activity related to privilege escalation. By focusing on the ends with paths and integrity levels, the rule aims to flag situations typical of UAC bypass techniques, particularly associated with the UACMe project, which provides various methods of evading UAC controls.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2021-08-23