heroui logo

Local Privilege Escalation Indicator TabTip

Sigma Rules

View Source
Summary
This detection rule identifies local privilege escalation attempts involving TabTip, an application associated with Microsoft Windows's touch keyboard interface. The rule is triggered when the system logs an event from the Microsoft-Windows-DistributedCOM provider indicating the invocation of TabTip.exe using specific parameters. One of the significant exploitation tools that can leverage this invocation is JuicyPotatoNG, which employs DCOM (Distributed Component Object Model) for privilege escalation in a brute force attack mode. The rule meticulously specifies conditions such as the Provider_Name being 'Microsoft-Windows-DistributedCOM', an EventID of 10001, and the parameters linked to the TabTip invocation, ensuring high-fidelity detection of such tactics that attackers might utilize to elevate their privileges on a targeted Windows system. This makes it an essential component in an organization's detection strategy against privilege escalation attempts.
Categories
  • Windows
  • Endpoint
  • On-Premise
Data Sources
  • Windows Registry
  • Logon Session
  • Process
Created: 2022-10-07