heroui logo

UAC Bypass Abusing Winsat Path Parsing - File

Sigma Rules

View Source
Summary
This detection rule identifies attempts to bypass User Account Control (UAC) by exploiting a path parsing flaw in the Windows System Assessment Tool (winsat.exe). Specifically, the rule analyzes file events for any executable files intended to execute from a seemingly malicious path under the user’s AppData Local Temp directory, which are likely to impersonate legitimate system processes to gain unauthorized privilege escalation. The condition for breach detection is met when the target filename both starts with 'C:\Users\' and ends with specified filenames related to the winsat.exe or winmm.dll located in the Temp directory. Such patterns are indicative of a tactical maneuver prevalent in modern attack vectors, designed to exploit Windows mechanisms inadequately enforcing UAC. This rule is essential for enhancing endpoint security by monitoring and preventing unauthorized privilege elevation attempts through subtle but exploitable system paths.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
Created: 2021-08-30