heroui logo

UAC Bypass Attempt via Privileged IFileOperation COM Interface

Elastic Detection Rules

View Source
Summary
This rule detects attempts to bypass User Account Control (UAC) on Windows by monitoring for specific file changes associated with the privileged IFileOperation COM interface. By side-loading malicious DLLs into the dllhost.exe process, attackers can execute code with elevated permissions, potentially leading to system compromise. The rule focuses on detecting file changes where the DLL names indicate a potential side-loading (e.g., wow64log.dll, comctl32.dll) while filtering out benign system paths to minimize false positives. The risk score of 73 and high severity indicates significant concern for organizations as these techniques could be utilized by sophisticated adversaries to gain elevated permissions undetected. Proper investigation steps include confirming the integrity level of involved processes, investigating file origins, and correlating alerts across different security solutions.
Categories
  • Endpoint
  • Windows
  • Cloud
Data Sources
  • Process
  • File
  • WMI
  • Network Traffic
  • Malware Repository
ATT&CK Techniques
  • T1548
  • T1548.002
  • T1574
  • T1574.002
Created: 2020-10-27