heroui logo

Potential Modification of Accessibility Binaries

Elastic Detection Rules

View Source
Summary
The rule 'Potential Modification of Accessibility Binaries' is designed to detect potential malicious activity in Windows environments that exploit accessibility features to achieve persistence or elevate privileges. Adversaries can manipulate how accessibility binaries launch to get a command shell or install a backdoor without requiring user logins. The detection focuses on identifying unauthorized executions of accessibility-related processes, specifically targeting processes that do not match valid binaries. These could indicate a custom or hijacked executable used by an attacker. This rule combines EQL queries and investigative guidance, emphasizing the importance of validating the integrity and origin of executables associated with accessibility features on Windows operating systems. Furthermore, it includes actionable investigation and response recommendations, pointing out the need for monitoring user and process behavior to ensure system security and integrity.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • User Account
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1546
  • T1546.008
Created: 2020-02-18