
Summary
This analytic rule detects instances of the Windows system process ComputerDefaults.exe spawning child processes, which can be a vector for privilege escalation. The detection mechanism focuses on identifying abnormal execution patterns and unusual parent-child process relationships that deviate from normative behaviors, which could indicate malicious intent. ComputerDefaults.exe is normally a benign process used for managing default application settings; however, threat actors can exploit it to bypass User Account Control (UAC) and execute unauthorized code with higher privileges. The rule leverages Sysmon EventID 1 data to monitor and capture process execution details, ensuring that any suspicions of modified system defaults or hidden script execution can be promptly identified. Security teams should implement this detection to safeguard system integrity by differentiating legitimate operations from those potentially signaling an ongoing attack.
Categories
- Endpoint
- Windows
Data Sources
- Process
ATT&CK Techniques
- T1548.002
Created: 2025-10-31