
Summary
This detection rule identifies instances where the Windows process 'sdclt.exe' (Windows Backup User Interface) spawns new child processes, which may indicate potential misuse of this process for privilege escalation or other malicious activities. 'Sdclt.exe' typically facilitates backup operations, but attackers can exploit it to bypass User Access Control (UAC) protections. By creating a rule that monitors for this specific parent process creating child processes, security teams can effectively flag unusual or unauthorized behavior associated with this utility. The detection leverages the process creation logs to inspect the parent-child relationship of processes, thus helping to mitigate risks associated with privilege escalation and potential malware execution. The selection criteria focus on instances where the parent image ends with 'sdclt.exe,' and this condition triggers alerts for security analysts to investigate further. False positives can occur from legitimate backup operations; hence careful review of alerts is recommended.
Categories
- Endpoint
- Windows
- Application
Data Sources
- Process
Created: 2020-05-02