
Summary
This detection rule identifies the use of the "Accesschk" utility, a well-known tool created by SysInternals for auditing access and privilege levels within Windows environments. Attackers often leverage Accesschk to verify process privileges as part of privilege escalation tactics. The rule monitors for the execution of Accesschk through process creation logs, specifically filtering for certain command-line parameters and product details indicating the use of the Accesschk executable. By maintaining a focus on process creation events where Accesschk or its variants are invoked, the rule helps security teams detect potentially malicious activities disguised under legitimate system administration tasks. The rule combines both image-based selections, checking for characteristics of the Accesschk executables, and command line parameters commonly associated with abuse, thus providing a multifaceted approach to detection. It is crucial for defenders to consider legitimate use cases such as by system administrators, which may generate false positives if not carefully analyzed. The references provided relate to techniques of privilege escalation using Accesschk, thus enriching the understanding and context of the detection.
Categories
- Endpoint
- Windows
- Infrastructure
Data Sources
- Process
- Command
Created: 2020-10-13