
Summary
This detection rule identifies potential privilege escalation attempts that leverage a vulnerability in the Windows Installer (MSI) repair mechanism. The rule is designed to detect when a browser process accesses the Microsoft Help page, followed by the creation of an elevated process, which could indicate exploitation. The rule monitors processes on Windows systems, particularly searching for instances where popular browsers (like Chrome, Edge, Firefox, etc.) navigate to URLs containing 'go.microsoft.com'. This navigation suggests that the user attempted to access help documentation, potentially as part of a malicious act if immediately followed by the execution of an elevated process. Investigative steps include reviewing the browser process, user domain, parent process behavior, and associated security alerts to determine if this activity signals a threat. Additionally, the rule includes potential false positives from legitimate activities such as software updates or administrative tasks that may trigger alerts due to their interaction with the Microsoft Help service. Recommendations for response and remediation focus on isolating affected systems, reviewing logs, terminating suspicious processes, and applying necessary security patches, emphasizing the importance of swift action to mitigate risks.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Web Credential
- Application Log
ATT&CK Techniques
- T1068
- T1218
- T1218.007
Created: 2024-09-12