heroui logo

Bypass UAC via Event Viewer

Elastic Detection Rules

View Source
Summary
This rule identifies instances of User Account Control (UAC) bypass by monitoring processes spawned by the Windows Event Viewer application (eventvwr.exe). UAC is a security feature in Windows that helps prevent unauthorized changes to the operating system and allows for privilege escalation only after user consent. Attackers often exploit UAC bypass techniques to execute code with elevated privileges without triggering a prompt. The rule triggers when processes other than the expected mmc.exe or werfault.exe are initiated by eventvwr.exe. Key investigative steps include examining the parent process tree of detected instances, checking for unusual registry modifications, and assessing associated alerts over the past 48 hours. This enhances detection and response to potential privilege escalation attacks, indicating a high risk level (score: 73). If exploited, it could result in unauthorized system access and potentially harmful modifications to the system. Remediation steps focus on isolating affected hosts and running a comprehensive malware scan to identify and neutralize threats.
Categories
  • Windows
  • Endpoint
  • On-Premise
  • Infrastructure
Data Sources
  • Process
  • Windows Registry
  • Logon Session
  • Application Log
  • User Account
ATT&CK Techniques
  • T1548
  • T1548.002
Created: 2020-03-17