heroui logo

ImageLoad via Windows Update Auto Update Client

Elastic Detection Rules

View Source
Summary
This detection rule identifies potential abuse of the Windows Update Auto Update Client (wuauclt.exe) for loading arbitrary DLL files, which can be a method used by adversaries to execute malicious code while mimicking legitimate activity. It analyzes process start events where specific arguments related to the Update Client are present, particularly focusing on the arguments "/RunHandlerComServer" and "/UpdateDeploymentProvider". Additionally, it checks common writable paths typically used by standard users where malicious DLLs could be placed (for example, C:\Users\*.dll). The rule intends to detect defense evasion techniques leveraging the Windows Update Client component, enabling malicious entities to conceal their activities within normal Windows operations. Investigation steps outlined in the rule emphasize examining the command line arguments, analyzing the executing parent process tree, and investigating any connected services and behaviors, such as network activity or modifications to the file system and registry. The response actions include isolation of the host involved, searching for additional malwares, and remediating indicators of compromise. The risk score associated with the rule is 47, classifying it as a medium-severity alert requiring further analysis and response.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
  • Network Traffic
  • File
ATT&CK Techniques
  • T1218
Created: 2020-10-13