Potential Local Exploitation for Privilege Escalation

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query detects a process that runs under SYSTEM user's security context and was spawned by a process that was running under a lower security context indicating an exploitation for privilege escalation. Ref: https://attack.mitre.org/techniques/T1068/

Attribute Value
Type Hunting Query
Solution GitHub Only
ID a78b826e-f2d1-42f9-b21b-20cf3bc2d391
Tactics Execution
Techniques T1068
Required Connectors SecurityEvents
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
Event EventID == "1"
EventLog == "Microsoft-Windows-Sysmon/Operational"
?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries