
Summary
The rule is designed to detect the bypass of User Account Control (UAC) on Windows systems by monitoring the interaction between two key processes: pkgmgr.exe and dism.exe. This pattern of behavior is associated with specific tactics employed by adversaries to escalate privileges, potentially allowing them to execute commands with elevated system permissions without being prompted by UAC. The detection logic focuses on process creation events where the parent image ends with 'pkgmgr.exe' and the child image ends with 'dism.exe'. Additionally, it restricts detections to those events occurring at a high integrity level or above. The rule is attributed to Christian Burkard from Nextron Systems and is considered to have a high severity level due to the potential risks associated with UAC bypass techniques.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2021-08-23