heroui logo

UAC Bypass Attempt via Windows Directory Masquerading

Elastic Detection Rules

View Source
Summary
This detection rule identifies attempts to bypass User Account Control (UAC) by masquerading as a trusted Windows directory. UAC is a security feature in Windows that helps prevent unauthorized changes to the operating system by prompting for approval or an administrator password. Attackers can exploit UAC to execute malicious code with elevated permissions stealthily, thereby gaining unauthorized access to system resources. This rule operates by querying a series of logs, particularly focusing on processes that are initiated from known Windows system directories, namely 'C:\Windows\system32\' and 'C:\Windows\SysWOW64\'. Key investigative steps include analyzing the process execution chain to identify anomalies, monitoring for suspicious behavior, and examining associated alerts in the recent past. The rule requires various data sources from Windows logging systems, including Winlogbeat, Microsoft Defender, and endpoint event logs for thorough analysis.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Logon Session
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1548
  • T1548.002
  • T1036
  • T1036.005
Created: 2020-10-26