heroui logo

Potential privilege escalation via CVE-2022-38028

Elastic Detection Rules

View Source
Summary
This detection rule identifies potential privilege escalation attempts via the exploitation of CVE-2022-38028, which affects the Windows Print Spooler service. Attackers may manipulate the JavaScript file 'MPDW-constraints.js' located in certain system directories to gain elevated privileges. The rule analyzes event data, specifically targeting file events indicating the presence of the malicious JavaScript file in critical paths. It utilizes multiple data sources including endpoint logs, Sysmon logs, and Microsoft Defender for Endpoint to correlate events and enhance threat detection. The recommended investigation process involves confirming unauthorized file placements, checking timestamps, monitoring user activities, and correlating with additional security data to assess the exploitation. Furthermore, the rule establishes guidelines for response and remediation in the case of an identified threat, emphasizing immediate isolation and removal of unauthorized files, along with security patch implementations.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
  • Process
  • Application Log
  • Network Traffic
  • Logon Session
ATT&CK Techniques
  • T1068
  • T1036
Created: 2024-04-23