
Summary
The rule detects instances where the Windows process explorer.exe is initiated with the /NOUACCHECK flag. This specific flag allows the spawned explorer.exe process to bypass User Account Control (UAC) checks for any of its subprocesses, potentially allowing for malicious activities without user notification. The detection logic targets process creation events within the Windows environment, particularly focusing on instances where explorer.exe is launched with the aforementioned command line argument. Additionally, the rule filters out possibly legitimate instances of the explorer.exe process initiated by svchost.exe, which is commonly used by various Windows services. The rule has a high severity level, reflecting its utility in identifying possible evasion of security mechanisms.
Categories
- Windows
- Endpoint
- Application
Data Sources
- Process
- Logon Session
Created: 2022-02-23