heroui logo

UAC Bypass Using Windows Media Player - Process

Sigma Rules

View Source
Summary
This detection rule identifies attempts to bypass User Account Control (UAC) on Windows systems specifically using a technique involving the Windows Media Player's `osk.exe` application. The rule looks for suspicious process creation patterns where the `osk.exe` process is spawned as well as the `cmd.exe` process executed via a specific command line associated with the Microsoft Management Console (MMC) Event Viewer. Additionally, the rule checks for processes running with high integrity levels that are indicative of privilege escalation attempts.
Categories
  • Endpoint
  • Windows
  • Application
Data Sources
  • Process
Created: 2021-08-23