Rule Content
- title: Windows Kernel and 3rd-party drivers exploits. Token stealing
id: 8065b1b4-1778-4427-877f-6bf948b26d38
description: Detection of child processes spawned with SYSTEM privileges by parents
with non-SYSTEM privileges and Medium integrity level
references:
- https://www.slideshare.net/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
tags:
- attack.privilege_escalation
- attack.t1068
status: experimental
author: Teymur Kheirkhabarov (source), Daniil Yugoslavskiy (rule)
date: 2019/06/03
logsource:
category: process_creation
product: windows
service: null
detection:
selection:
ParentIntegrityLevel: Medium
IntegrityLevel: System
User: NT AUTHORITY\SYSTEM
condition: selection
falsepositives:
- Unknown
level: critical
enrichment:
- EN_0001_cache_sysmon_event_id_1_info
- EN_0002_enrich_sysmon_event_id_1_with_parent_info