Detection rules › Kusto Query Language
Detecting UAC bypass - modify Windows Store settings
This query identifies modification a specific registry key and then launching wsreset.exe that resets the Windows Store settings.
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Impact | T1490 Inhibit System Recovery |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 1 | Process creation |
| Security-Auditing | 4688 | A new process has been created. |
| Defender-DeviceProcessEvents | 9001000 | Process activity (any) |
Stages and Predicates
Stage 1: source
DeviceProcessEvents
Stage 2: where
InitiatingProcessFileName eq "wsreset.exe"
Stage 3: where
ProcessIntegrityLevel eq "High"
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
InitiatingProcessFileName | eq |
|
ProcessIntegrityLevel | eq |
|