heroui logo

SeDebugPrivilege Enabled by a Suspicious Process

Elastic Detection Rules

View Source
Summary
This detection rule identifies instances where a process running as the SYSTEM account impersonates a Windows core binary and enables the SeDebugPrivilege, a Windows privilege that allows processes to debug and manipulate other processes. The significance of this rule lies in its ability to flag potential privilege escalation attempts that adversaries may utilize to bypass access controls and perform malicious actions. The rule leverages Windows Event 4703, which logs changes to token privileges, and uses EQL (Event Query Language) for detection, specifically targeting 'Token Right Adjusted Events' where the SecDebugPrivilege has been enabled on processes that are not recognized as system-level tasks. By excluding known legitimate processes, it focuses on potential malicious activities that could indicate breaches or exploitation attempts. The rule is set to monitor data from various Windows logs and can be an integral part of a security team's threat detection capabilities.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Logon Session
  • File
  • Application Log
ATT&CK Techniques
  • T1134
Created: 2022-10-20