Explorer UAC Bypass Via /NOUACCHECK Parameter
Detects possible attempt to circumvent the User Account Control (UAC) by executing Windows Explorer to spawn a command line interpreter process without triggering UAC prompts.
Sigma rule (View on GitHub)
1title: Explorer UAC Bypass Via /NOUACCHECK Parameter
2id: c284e98e-a2a6-4917-aeb9-7159c6283e05
3description: Detects possible attempt to circumvent the User Account Control (UAC) by executing Windows Explorer to spawn a command line interpreter process without triggering UAC prompts.
4status: experimental
5date: 2023/07/16
6author: \@kostastsale
7references:
8 -
9logsource:
10 category: process_creation
11 product: windows
12detection:
13 selection1:
14 CommandLine|contains:
15 - ' /nouaccheck '
16 ParentImage|endswith:
17 - '\explorer.exe'
18 Image|endswith:
19 - '\powershell.exe'
20 - '\pwsh.exe'
21 - '\powershell_ise.exe'
22 - '\cmd.exe'
23 condition: selection1
24falsepositives:
25 - Unlikely
26level: high
27tags:
28 - attack.privilege_escalation
29 - attack.T1548.002
Related rules
- KrbRelayUp local privilege escalation.
- SamAccountName Spoofing and Domain Controller Impersonation
- AppInit DLL Installation
- Non-Microsoft App Package Installation Process
- Non-depmod Process Modifying modules.dep