heroui logo

UAC Bypass Using IEInstal - File

Sigma Rules

View Source
Summary
This rule is designed to detect instances of User Account Control (UAC) bypasses leveraging the Internet Explorer installation executable (IEInstal.exe). It focuses on monitoring specific file-related events in Windows environments where the UAC mechanism can potentially be evaded by manipulating installation paths. The key components in the detection focus on the location of the executable, typically found in the 'Program Files' directory, and the characteristics of the target filename, which must reside in the user's AppData local temp directory, leading to the execution of 'consent.exe'. The rule specifically targets scenarios where 'IEInstal.exe' is used to create or modify files that are subsequently designed to bypass user prompts for elevated privileges, thus facilitating unauthorized privilege escalation. False positives are currently unknown, making it critical to analyze instances flagged by this rule against known legitimate software activities.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
Created: 2021-08-30