heroui logo

Consent.exe Suspicious Child Process

Anvilogic Forge

View Source
Summary
This detection rule is designed to identify suspicious child processes spawned by `consent.exe`, a legitimate Microsoft Windows process that handles User Account Control (UAC) for managing administrative permissions. Attackers might exploit UAC mechanisms to execute unauthorized commands under elevated privileges, particularly by creating malicious child processes that appear to be benign. By analyzing events generated by Windows Sysmon, the rule leverages specific event codes to filter and examine any instance where `consent.exe` is the parent process. It checks the validity of the child process path, ensuring it is not `WerFault.exe`, which is another legitimate system process. This detection employs regex expressions to match the expected paths and outputs relevant data, such as timestamps, host information, user details, and the processes involved. By aggregating this data, it aims to flag any potentially malicious behavior that could indicate privilege escalation attempts.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1059
  • T1068
  • T1548
Created: 2025-08-12