heroui logo

UAC Bypass Tools Using ComputerDefaults

Sigma Rules

View Source
Summary
This rule aims to detect the use of tools like UACMe that leverage the executable 'ComputerDefaults.exe' for bypassing User Account Control (UAC) on Windows systems. By monitoring process creation events, particularly those where the integrity level is elevated (High, System, S-1-16-16384, S-1-16-12288), the rule captures suspicious behavior indicative of UAC bypass attempts. It looks for instances of 'ComputerDefaults.exe' running under these high integrity levels. The detection condition combines a selection of process characteristics that highlight the potential use of UAC bypass techniques with a filter to reduce false positives from normal operational activities, particularly filtering out processes spawned by the Windows System32 and Program Files directories. This rule is particularly significant as it highlights a common tactic used by attackers to escalate privileges on a compromised Windows system, facilitating further exploitation of vulnerabilities.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2021-08-31