UAC Bypass Attempt with IEditionUpgradeManager Elevated COM Interfaceedit

Identifies attempts to bypass User Account Control (UAC) by abusing an elevated COM Interface to launch a rogue Windows ClipUp program. Attackers may attempt to bypass UAC to stealthily execute code with elevated permissions.

Rule type: eql

Rule indices:

  • winlogbeat-*

Severity: high

Risk score: 71

Runs every: 5 minutes

Searches indices from: now-9m (Date Math format, see also Additional look-back time)

Maximum alerts per execution: 100



  • Elastic
  • Host
  • Windows
  • Threat Detection
  • Privilege Escalation

Version: 2 (version history)

Added (Elastic Stack release): 7.11.0

Last modified (Elastic Stack release): 7.11.2

Rule authors: Elastic

Rule license: Elastic License

Rule queryedit

process where event.type in ("start", "process_started", "info") and == "Clipup.exe" and process.executable !=
"C:\\Windows\\System32\\ClipUp.exe" and ==
"dllhost.exe" and /* CLSID of the Elevated COM Interface
IEditionUpgradeManager */ wildcard(process.parent.args,"/Processid:{B

Threat mappingedit


Rule version historyedit

Version 2 (7.11.2 release)
  • Formatting only