
Summary
The 'Sdclt UAC Bypass' analytic rule is designed to detect suspicious modifications to the Windows Registry associated with the `sdclt.exe` executable, a technique commonly exploited to bypass User Account Control (UAC). By leveraging various logs from Endpoint Detection and Response (EDR) agents, it specifically targets registries indicating altered behavior of UAC mechanisms. The detection logic focuses on specific registry paths and values which, when modified, may signal an attempt to execute processes with elevated privileges without the user's consent. This behavior presents significant security risks as it can lead to unauthorized code execution and privilege escalation, allowing attackers chances to persist in the environment. The implementation requires ingestion of relevant process and registry alteration logs, which must be appropriately mapped to the Splunk technology stack, ensuring comprehensive monitoring of the endpoint security landscape.
Categories
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
- Process
- Process
- Process
ATT&CK Techniques
- T1548.002
- T1548
Created: 2024-11-13