
Summary
This rule detects privilege escalation attempts via manipulation of the Windir environment variable on Windows systems. The Windir variable is critical as it points to the Windows installation directory. Attackers may alter this variable to redirect applications or services to malicious directories, which can lead to unauthorized privilege elevation. The rule leverages a query that monitors registry changes corresponding to the Windir and SystemRoot environment variables. It specifically looks for modifications across various registry paths and ensures that the values do not point to standard locations (e.g., 'C:\windows' or '%SystemRoot%'). If a deviation occurs, it indicates a potential malicious intent and is flagged accordingly. The rule is particularly significant as it addresses a common tactic in Windows-based attacks, enabling organizations to respond swiftly to such privilege escalation attempts.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Application Log
- Malware Repository
ATT&CK Techniques
- T1574
- T1574.007
Created: 2020-11-26