Skip to content

Latest commit

 

History

History
33 lines (26 loc) · 1.33 KB

MATCH-S00724.md

File metadata and controls

33 lines (26 loc) · 1.33 KB

Rules: Windows Update Agent DLL Changed

Description

The Windows Update Agent executable, wuauclt.exe, can be abused by attackers to execute malicious code with elevated privileges by changing the DLL file loaded by the process. This technique is most commonly reported as part of phishing campaigns where the initial payload is a macro-enabled Microsoft Word document.

Additional Details

Detail Value
Type Templated Match
Category Defense Evasion
Apply Risk to Entities user_username, device_hostname
Signal Name Windows Update Agent DLL Changed
Summary Expression User {{user_username}} ran a command on host {{device_hostname}} to modify the Windows Update Agent
Score/Severity Static: 4
Enabled by Default True
Prototype False
Tags _mitreAttackTechnique:T1218.011, _mitreAttackTactic:TA0005, _mitreAttackTechnique:T1129

Vendors and Products

Fields Used

Origin Field
Normalized Schema commandLine
Normalized Schema device_hostname
Normalized Schema user_username