Privilege Escalation (TA0004)(opens in a new tab or window)
endpoint(opens in a new tab or window)
windows(opens in a new tab or window)
process where host.os.type == "windows" and event.type == "start" and
process.executable : "C:\\*\\AppData\\*\\Temp\\IDC*.tmp\\*.exe" and
process.parent.name : "ieinstal.exe" and process.parent.args : "-Embedding"
/* uncomment once in winlogbeat */
/* and not (process.code_signature.subject_name == "Microsoft Corporation" and process.code_signature.trusted == true) */
Install detection rules in Elastic Security
Detect UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(opens in a new tab or window).