Detection rules › Kusto Query Language

Detecting UAC bypass - elevated COM interface

Source
upstream

This query identifies processes spawned with high integrity from dllhost.exe with a command line that contains one of three specific CLSID GUIDs.

MITRE ATT&CK coverage

TacticTechniques
ImpactT1490 Inhibit System Recovery

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.
Defender-DeviceProcessEvents9001000Process activity (any)

Stages and Predicates

Stage 1: source

DeviceProcessEvents

Stage 2: where

InitiatingProcessFileName eq "dllhost.exe"

Stage 3: where

ProcessIntegrityLevel eq "High"

Stage 4: where

InitiatingProcessCommandLine match ["E9495B87-D950-4AB5-87A5-FF6D70BF3E90", "3E5FC7F9-9A51-4367-9063-A120244FBEC7", "D2E7041B-2927-42fb-8E9F-7CE93B6DC937"]

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
InitiatingProcessCommandLinematch
  • 3E5FC7F9-9A51-4367-9063-A120244FBEC7
  • D2E7041B-2927-42fb-8E9F-7CE93B6DC937
  • E9495B87-D950-4AB5-87A5-FF6D70BF3E90
InitiatingProcessFileNameeq
  • dllhost.exe
ProcessIntegrityLeveleq
  • High corpus 16 (sigma 16)