
Summary
This rule detects the execution of a backdoor that registers a malicious debugger, enabling it to be launched from the Windows login screen. This is done by exploiting built-in accessibility tools like Sticky Keys, UtilMan, and others. The detection focuses on process creation events where the parent image is winlogon.exe, combined with specific child processes like cmd.exe, cscript.exe, and powershell.exe. The command line arguments used in conjunction with these processes include terms associated with accessibility tools, suggesting an attempt to create a backdoor for privilege escalation. The rule aims to identify potentially malicious activity indicative of persistence mechanisms used by attackers.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2018-03-15