heroui logo

SilentCleanup UAC Bypass

Splunk Security Content

View Source
Summary
The 'SilentCleanup UAC Bypass' detection rule is designed to identify suspicious modifications to the Windows registry, specifically targeting changes that may indicate an attempt to bypass User Account Control (UAC) via the SilentCleanup scheduled task. The rule utilizes data from various Endpoint Detection and Response (EDR) sources, such as Sysmon and Windows Event logs, to analyze registry changes within the registry path containing environment variables, particularly where executable values are involved. By detecting these changes, the rule aims to reveal potential malicious activities that can escalate an attacker's privileges without requiring user consent. If such modification patterns are validated as malicious, they could result in unauthorized administrative access, leading to further compromises and persistence on the affected system.
Categories
  • Endpoint
  • Windows
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Application Log
  • Process
ATT&CK Techniques
  • T1548.002
  • T1548
Created: 2024-11-13