heroui logo

FodHelper UAC Bypass

Splunk Security Content

View Source
Summary
The FodHelper UAC Bypass detection rule identifies potentially malicious attempts to exploit a User Account Control (UAC) bypass via the execution of `fodhelper.exe`. This executable can spawn child processes while accessing specific registry keys, signaling a potential privilege escalation by an attacker. By utilizing Endpoint Detection and Response (EDR) telemetry, this rule captures instances where `fodhelper.exe` is involved in process creation, which can indicate unauthorized escalations in privileges on a Windows system. Compromised execution privileges could lead to unauthorized changes and manipulation of the affected system, highlighting the critical importance of monitoring for this behavior.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1548.002
  • T1548
  • T1112
Created: 2024-12-10