You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Windows Update Agent executable, wuauclt.exe, can be abused by attackers to execute malicious code with elevated privileges by changing the DLL file loaded by the process. This technique is most commonly reported as part of phishing campaigns where the initial payload is a macro-enabled Microsoft Word document.
Additional Details
Detail
Value
Type
Templated Match
Category
Defense Evasion
Apply Risk to Entities
user_username, device_hostname
Signal Name
Windows Update Agent DLL Changed
Summary Expression
User {{user_username}} ran a command on host {{device_hostname}} to modify the Windows Update Agent