heroui logo

UAC Bypass Using IDiagnostic Profile - File

Sigma Rules

View Source
Summary
This detection rule targets potential UAC (User Account Control) bypasses using the IDiagnosticProfile technique on Windows systems. Specifically, it identifies instances where the 'dllhost.exe' process creates a .dll file within the 'C:\Windows\System32' directory. This behavior is indicative of unauthorized privilege escalation attempts, as modifying or creating files in the System32 directory usually requires elevated permissions. The detection works by monitoring file creation events and employing selection criteria that specify the process image name and the characteristics of the target file. The rule was authored by Nasreddine Bencherchali from Nextron Systems and is relevant for security teams aiming to safeguard Windows systems against advanced threats that attempt to evade security mechanisms.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
  • Process
Created: 2022-07-03