heroui logo

NET Profiler UAC bypass

Splunk Security Content

View Source
Summary
The NET Profiler UAC bypass detection rule aims to identify potential attempts to bypass the User Account Control (UAC) feature in Windows by monitoring changes to the Windows registry, specifically the '.NET COR_PROFILER_PATH' key. When malicious actors want to escalate privileges or maintain persistence, they often modify this registry key to load a DLL file, typically via 'mmc.exe', which triggers the ability to execute arbitrary code with elevated privileges. The rule utilizes Sysmon Event IDs 12 and 13 to analyze registry modifications and employs the Endpoint.Registry data model for its searches. This monitoring strategy helps in pinpointing alterations indicative of privilege escalation attempts, thereby enhancing the overall security posture against such tactics.
Categories
  • Windows
  • Endpoint
  • Cloud
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1548.002
  • T1548
Created: 2024-11-13