Bypass UAC via Sdclt
Identifies User Account Control (UAC) bypass via sdclt.exe. Attackers bypass UAC to stealthily execute code with elevated permissions.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2020/09/02"
3integration = ["endpoint", "windows"]
4maturity = "development"
5updated_date = "2023/10/13"
6
7[rule]
8author = ["Elastic"]
9description = """
10Identifies User Account Control (UAC) bypass via sdclt.exe. Attackers bypass UAC to stealthily execute code with
11elevated permissions.
12"""
13from = "now-9m"
14index = ["logs-endpoint.events.*", "winlogbeat-*", "logs-windows.*"]
15language = "eql"
16license = "Elastic License v2"
17name = "Bypass UAC via Sdclt"
18risk_score = 73
19rule_id = "9b54e002-034a-47ac-9307-ad12c03fa900"
20severity = "high"
21tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Privilege Escalation", "Tactic: Defense Evasion", "Data Source: Elastic Defend"]
22type = "eql"
23
24query = '''
25/* add winlogbeat-* when process.code_signature.* fields are populated */
26/* still needs testing, applicable binary was not available on test machine */
27
28sequence with maxspan=1m
29 [process where host.os.type == "windows" and event.type == "start" and process.name : "sdclt.exe" and
30 /* uncomment once in winlogbeat */
31 /* process.code_signature.subject_name == "Microsoft Corporation" and process.code_signature.trusted == true and */
32 process.args : "/kickoffelev"
33 ] by process.entity_id
34 [process where host.os.type == "windows" and event.type == "start" and process.parent.name : "sdclt.exe" and
35 not (process.executable : "C:\\Windows\\System32\\sdclt.exe" or
36 process.executable : "C:\\Windows\\System32\\control.exe" or
37 process.executable : "C:\\Windows\\SysWOW64\\sdclt.exe" or
38 process.executable : "C:\\Windows\\SysWOW64\\control.exe")
39 ] by process.parent.entity_id
40'''
41
42
43[[rule.threat]]
44framework = "MITRE ATT&CK"
45[[rule.threat.technique]]
46id = "T1548"
47name = "Abuse Elevation Control Mechanism"
48reference = "https://attack.mitre.org/techniques/T1548/"
49[[rule.threat.technique.subtechnique]]
50id = "T1548.002"
51name = "Bypass User Account Control"
52reference = "https://attack.mitre.org/techniques/T1548/002/"
53
54
55
56[rule.threat.tactic]
57id = "TA0004"
58name = "Privilege Escalation"
59reference = "https://attack.mitre.org/tactics/TA0004/"
60
61[[rule.threat]]
62framework = "MITRE ATT&CK"
63[[rule.threat.technique]]
64id = "T1218"
65name = "System Binary Proxy Execution"
66reference = "https://attack.mitre.org/techniques/T1218/"
67
68[[rule.threat.technique.subtechnique]]
69id = "T1218.014"
70name = "MMC"
71reference = "https://attack.mitre.org/techniques/T1218/014/"
72
73
74[rule.threat.tactic]
75id = "TA0005"
76name = "Defense Evasion"
77reference = "https://attack.mitre.org/tactics/TA0005/"
Related rules
- Parent Process PID Spoofing
- Service Control Spawned via Script Interpreter
- Adding Hidden File Attribute via Attrib
- First Time Seen Driver Loaded
- Image File Execution Options Injection