Detectionmediumstable

UAC Disabled

Detects when an attacker tries to disable User Account Control (UAC) by setting the registry value "EnableLUA" to 0.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
François HubautCreated Wed Jan 05Updated Fri May 1048437c39-9e5f-47fb-af95-3d663c3f2919windows
Log Source
WindowsRegistry Set
ProductWindows← raw: windows
CategoryRegistry Set← raw: registry_set
Detection Logic
Detection Logic1 selector
detection:
    selection:
        TargetObject|contains: '\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA'
        Details: 'DWORD (0x00000000)'
    condition: selection
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

Rule Metadata
Rule ID
48437c39-9e5f-47fb-af95-3d663c3f2919
Status
stable
Level
medium
Type
Detection
Created
Wed Jan 05
Modified
Fri May 10
Path
rules/windows/registry/registry_set/registry_set_uac_disable.yml
Raw Tags
attack.privilege-escalationattack.defense-evasionattack.t1548.002
View on GitHub