
Summary
The rule identifies potential privilege escalation attempts in Windows systems involving the creation of folders with the extension '.Exe.Local' under the 'C:\Windows\System32' directory. This technique can be employed by attackers to sideload the 'comctl32.dll' library, enabling them to run malicious code with elevated privileges. Specifically, the rule monitors for instances where any of the specified target filenames such as 'logonUI.exe.local' and others are created, which are commonly associated with Windows processes. By detecting these file creations, the rule helps in identifying suspicious activity that could lead to unauthorized access or system compromise. The detection is triggered based on the specific condition that checks for the specified target filenames that start with the '.local' suffix combined with the presence of 'comctl32.dll'.
Categories
- Windows
- Endpoint
Data Sources
- File
Created: 2022-12-16