
Summary
This detection rule targets a specific method of privilege escalation on Windows systems, identified by the creation of a symbolic link between the command prompt executable (cmd.exe) and the on-screen keyboard executable (osk.exe) using the Windows 'mklink' command. By exploiting this technique, an attacker can open an elevated command prompt from the login screen, bypassing the requirement to log in. The rule is designed to trigger when the condition that involves both the selection of 'cmd.exe' and the command line parameters indicating the use of 'mklink' to link to 'osk.exe' is met. It indicates a potential security breach that may allow unauthorized access to system functionalities and should be addressed through appropriate security measures.
Categories
- Windows
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1546.008
Created: 2022-12-11