
Summary
The detection rule titled 'ComputerDefaults UAC Bypass' targets potential abuse of the legitimate Windows executable 'computerdefaults.exe', which is associated with handling default programs in Windows. Threat actors may exploit this executable by manipulating the Windows registry to execute arbitrary commands, allowing for a User Account Control (UAC) bypass. This specific detection focuses on changes made to the registry key \HKCU\Software\Classes\ms-settings\shell\open\command, which could indicate an attempt to utilize 'computerdefaults.exe' as a means of privilege escalation. The detection logic employs a SQL-like syntax to query recent process events from CrowdStrike's EDR logs, looking for commands that modify the registry in connection with 'DelegateExecute'. This approach adheres to the MITRE ATT&CK framework, particularly technique T1548.002, which deals with bypassing user account controls through legitimate binaries and scripts. By monitoring these registry modifications, the detection aims to uncover potential malicious activities that might exploit 'computerdefaults.exe' for unauthorized command execution. The rule is crucial as it helps protect against privilege escalation tactics that threat actors may use to manipulate user permissions and execute harmful payloads.
Categories
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1548.002
Created: 2024-02-09