
Summary
This detection rule aims to identify attempts to bypass User Account Control (UAC) on Windows systems using DLL hijacking techniques involving DismHost.exe. Specifically, it focuses on instances where the ParentImage path includes user directory or temporary files, indicating a potential attack vector exploited by malicious actors. The detection logic looks for high integrity levels typically associated with elevated privileges, suggesting that an unauthorized process might be manipulating system processes or attempting to gain escalated permissions. By monitoring process creation events, particularly the context under which DismHost.exe is invoked, this rule enhances security posturing against privilege escalation and defense evasion by detecting known patterns associated with the UAC bypass technique identified in the UACMe repository (issue 63). It is crucial for security teams to investigate such alerts to mitigate potential attacks that leverage this flaw.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Application Log
Created: 2021-08-30