
Summary
The rule aims to detect the UAC Bypass technique that utilizes consent.exe alongside comctl32.dll, commonly identified as UACMe 22. This technique can be leveraged by malicious actors to bypass User Account Control (UAC) prompts, allowing unauthorized elevation of privileges on Windows systems. The detection occurs during process creation activities within Windows operating environments. Specifically, it looks for processes initiated by consent.exe that spawn werfault.exe while operating at elevated integrity levels (High, System, S-1-16-16384, S-1-16-12288). The rule informs cybersecurity analysts and incident responders when processes exploit this UAC bypass method, indicating a potential security incident that may require further investigation.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2021-08-23