
Summary
This detection rule is designed to identify potentially malicious activity associated with the execution of accessibility tools and debuggers on Windows systems. Threat actors may target accessibility features like Sticky Keys (`sethc.exe`), Utility Manager (`utilman.exe`), or On-Screen Keyboard (`osk.exe`) to escalate privileges or maintain persistence on compromised machines. These tools can be triggered from the Windows logon screen, affording attackers the opportunity to execute commands without needing to log in. The logic of the rule uses Splunk queries to filter Windows Event ID 4688, which logs process creations, looking for known executables that could be started by these accessibility tools. It specifically flags scenarios where a known malicious process (such as `cmd.exe`, `powershell.exe`, etc.) is being launched by these accessibility programs. Detected events are then summarized in a table, providing critical context such as the timestamp, host, user involved, and details about the processes and their parent processes. The rule points to established techniques for executing backdoors via accessibility features (technique ID T1546.008) and sources documenting this behavior.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Windows Registry
- Logon Session
ATT&CK Techniques
- T1546.008
Created: 2024-02-09