heroui logo

Windows Access Token Winlogon Duplicate Handle In Uncommon Path

Splunk Security Content

View Source
Summary
This rule detects instances where a process attempts to duplicate a handle of winlogon.exe from an uncommon or public source path, utilizing Sysmon Event Code 10. The criterion includes ensuring that the access granted to the target process is specific (0x1040) while explicitly excluding common Windows system paths to focus on potentially malicious activities. Such behavior may indicate an adversary attempting to escalate privileges by utilizing the high-privilege tokens associated with the winlogon.exe process. The detection leverages the ability to capture important attributes surrounding the event, such as SourceImage and TargetImage, allowing identification of the initiating process and its context. If malicious activity is confirmed, it could result in unauthorized elevated access and system compromise, necessitating immediate attention.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1134
  • T1134.001
Created: 2024-11-13