
Summary
This detection rule identifies attempts to bypass User Account Control (UAC) using the IDiagnosticProfile technique on Windows systems. The rule focuses on monitoring process creation events where the parent process is DllHost.exe and the command line contains a specific process ID formatted as `{12C21EA7-2EB8-4B55-9249-AC243DA8C666}`. The rule also checks for high integrity levels, which indicates that the executing process has elevated privileges that make it capable of affecting system security. This behavior is associated with privileges escalation tactics often used by threat actors to gain higher access in the system and execute malicious payloads. By identifying such patterns, the rule aims to enhance the organization's ability to detect and respond to suspicious behavior that could indicate a UAC bypass attempt. It is essential for maintaining the integrity and security of Windows environments, especially those crucial for sensitive operations and data protection.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2022-07-03