heroui logo

Bypass UAC via Fodhelper.exe

Sigma Rules

View Source
Summary
This detection rule identifies potential exploitation of the Fodhelper.exe application to bypass User Account Control (UAC) in Windows environments. UAC is a security feature designed to prevent unauthorized changes to the operating system, and adversaries have been known to leverage various methods to escalate privileges. This specific rule focuses on monitoring process creation where the parent process ends with 'fodhelper.exe', as this could indicate an attempt to execute privileged processes through the application. It targets environments where process creation logs are available, particularly within Windows systems. The detection mechanism relies on filtering for specific attributes in the generated log data, allowing for the identification of potentially malicious activity attempting to escalate privileges without user consent.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
ATT&CK Techniques
  • T1548.002
Created: 2019-10-24