heroui logo

WSReset UAC Bypass

Splunk Security Content

View Source
Summary
The 'WSReset UAC Bypass' detection rule is designed to identify suspicious modifications to the Windows Registry that are indicative of attempts to bypass User Account Control (UAC) using the WSReset.exe utility. This rule specifically monitors registry changes occurring at the path related to the AppX package, where entries crucial for executing commands can be modified. Effective detection relies on data from Endpoint Detection and Response (EDR) systems, focusing on Sysmon events related to process creation and registry modifications. The specific registry keys monitored are the '(Default)' and 'DelegateExecute' values, which, when altered, can enable unauthorized commands to be executed with elevated privileges, posing a significant security threat.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1548.002
  • T1548
Created: 2024-11-13