
Summary
The FodHelper UAC Bypass detection rule identifies potentially malicious attempts to exploit a User Account Control (UAC) bypass via the execution of `fodhelper.exe`. This executable can spawn child processes while accessing specific registry keys, signaling a potential privilege escalation by an attacker. By utilizing Endpoint Detection and Response (EDR) telemetry, this rule captures instances where `fodhelper.exe` is involved in process creation, which can indicate unauthorized escalations in privileges on a Windows system. Compromised execution privileges could lead to unauthorized changes and manipulation of the affected system, highlighting the critical importance of monitoring for this behavior.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1548.002
- T1548
- T1112
Created: 2024-12-10