heroui logo

ConsentPromptBehaviorAdmin Registry Value Modified

Anvilogic Forge

View Source
Summary
This detection rule focuses on monitoring unauthorized changes to the Windows Registry key associated with User Account Control (UAC) behavior, specifically the `ConsentPromptBehaviorAdmin` setting. UAC is a security feature in Windows that helps prevent unauthorized changes to the operating system by prompting users for permission or an administrator password before allowing certain tasks at an elevated privilege level. Adversaries often exploit vulnerable UAC configurations to execute processes with elevated privileges without user consent. The rule uses event logging from Sysmon to capture instances where the specified registry key is altered or when processes execute commands that modify this key. Such modifications are indicative of attempts to bypass UAC and elevate privileges. The rule aims to detect these potentially malicious activities by filtering event codes related to registry modifications and collecting relevant information such as timestamps, host, user, process names, and parent process names, which can facilitate further investigation.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1548.002
  • T1548
Created: 2024-02-09