
Summary
The detection rule focuses on identifying the execution of 'VisualUiaVerifyNative.exe', a component of the Windows Software Development Kit (SDK) associated with accessibility features. This executable has been flagged for its potential to facilitate a bypass of Windows Defender Application Control (WDAC), particularly in contexts where malicious actors could exploit such features for evasion tactics. The rule captures instances where the process is initiated and aims to alert on its execution, as it is included in Microsoft's recommended block list aimed at mitigating defense evasion techniques. The rule is categorized under the process creation log source on Windows systems, thus it primarily operates within environments where these logging capabilities are enabled. It also notes a potential for false positives, particularly during legitimate use cases such as UI testing by developers. Therefore, careful consideration is required to avoid unnecessary alerts while ensuring that genuine threats can be effectively surfaced.
Categories
- Windows
Data Sources
- Process
Created: 2022-06-01