heroui logo

UAC Bypass With Fake DLL

Sigma Rules

View Source
Summary
This rule detects an attempt to bypass User Account Control (UAC) in Windows by loading a malicious DLL named 'dismcore.dll' through the legitimate 'dism.exe' process. The detection works by analyzing image load events, looking specifically for instances where 'dism.exe' attempts to load 'dismcore.dll' while ensuring that the DLL location matches the expected path in the System32 directory. If 'dism.exe' is executing without being filtered, it indicates a potential bypass of UAC, allowing malicious actions to be performed without appropriate user consent. This technique is particularly concerning as it employs a method commonly used in privilege escalation attacks, highlighting the importance of monitoring and detection capabilities in Windows environments.
Categories
  • Windows
  • Endpoint
Data Sources
  • Image
Created: 2020-10-06