Privilege Escalation (TA0004)
Sub-technique: T1068 - Exploitation for Privilege Escalation
Objective: Detect exploitation attempts to gain higher privileges on the system.
Processes Running with Elevated Privileges
DeviceProcessEvents
| where ProcessIntegrityLevel == "High" or ProcessIntegrityLevel == "System"
| project Timestamp, DeviceName, ProcessCommandLine, InitiatingProcessAccountName, InitiatingProcessCommandLine, InitiatingProcessFileName
| order by Timestamp descPurpose: Identify processes running with elevated privileges.
Known Exploitation Tools
DeviceProcessEvents
| where ProcessCommandLine has_any ("mimikatz", "procdump", "secretsdump")
| project Timestamp, DeviceName, ProcessCommandLine, InitiatingProcessAccountName, InitiatingProcessCommandLine, InitiatingProcessParentFileName, InitiatingProcessFileNamePurpose: Detect known exploitation tools.
New Driver Installation
DeviceDriverEvents
| where ActionType == "DriverInstalled"
| project Timestamp, DeviceName, DriverName, InitiatingProcessAccountNamePurpose: Monitor new driver installations that may be used for privilege escalation.
Kernel Module Load Events
Purpose: Detect loading of new kernel modules.
Exploitation via Process Injection
Purpose: Identify process injection attempts.
Detect UAC Bypass Attempts
Purpose: Monitor attempts to bypass User Account Control.
Privilege Escalation via Service Creation
Purpose: Detect service creation attempts that may be used for privilege escalation.
Detecting Usage of Exploit Mitigation Bypass
Purpose: Identify attempts to bypass exploit mitigation controls.
Privilege Escalation Using Scheduled Tasks
Purpose: Monitor for scheduled tasks used for privilege escalation.
Detect Privilege Escalation via Windows Installer
Purpose: Identify privilege escalation attempts using Windows Installer.
Last updated