heroui logo

Windows Privilege Escalation Suspicious Process Elevation

Splunk Security Content

View Source
Summary
This detection rule targets processes exhibiting potentially malicious behavior on a Windows system by monitoring for instances where a process with low or medium integrity spawns an elevated process with high or system integrity within suspicious directories. This behavior often signifies an attempt at privilege escalation by threat actors, as they seek to execute code with higher privileges for unauthorized access or operations. The detection leverages data from Sysmon Event ID 1 and Windows Event Log Security, specifically focusing on parent-child process relationships and integrity levels. Confirming such behavior can be critical, as it may lead to serious security breaches such as full system compromise.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1068
  • T1134.001
  • T1548
  • T1134
Created: 2024-11-13