
Summary
This rule detects potential activity indicating a malicious attempt to bypass User Account Control (UAC) on Windows systems by monitoring registry modifications. UAC is a critical security feature that requires all applications to run with the least privileges necessary, prompting for administrator approval when elevated access is needed. Malicious actors often disable UAC to execute arbitrary code with higher privileges, effectively undermining the security posture of Windows environments. The rule is designed to trigger alerts for registry changes that typically indicate the disabling of UAC settings, specifically monitoring changes to critical registry keys related to UAC configurations such as `EnableLUA` and `ConsentPromptBehaviorAdmin`. Investigation tactics include analyzing the process execution chain for abnormal behavior and correlating other alerts or activities on the affected host to identify potential security breaches. A robust response plan includes isolating affected hosts, restoring UAC settings, and conducting comprehensive forensic analysis of suspicious processes.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Logon Session
ATT&CK Techniques
- T1548
- T1548.002
- T1112
- T1562
- T1562.001
Created: 2021-01-20