heroui logo

Windows AppLocker Privilege Escalation via Unauthorized Bypass

Splunk Security Content

View Source
Summary
This analytic identifies potential unauthorized attempts to bypass Windows AppLocker restrictions, a control measure employed to allow system administrators to set which applications can be executed on their devices. Utilizing specific Windows Event Codes (8007, 8004, 8022, 8025, 8029, 8040), the detection focuses on aggregation of block events—specifically looking for instances where more than five attempts are recorded—indicative of malicious activity aimed at privilege escalation. The query processes logs to extract user and system data linked to the bypass events, which can serve as warning signals for potential security threats depending on the context of usage. It recommends context-aware assessments due to the possibility of false positives associated with genuine user actions, thereby prompting necessary investigations before concluding malicious intent.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1218
  • T1562
Created: 2024-11-13