OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself. (such as?)
OS-WINDOWS Microsoft Windows win32k local privilege escalation attempt
This rule alerts when a binary is sent that contains bytes that correspond to anomalous/malicious activity. Specifically, when an external library (DLL) is loaded and its corresponding exported functions are searched.
What To Look For
This rule will trigger when a binary is sent via SMTP to a mail server. Said binary should correspond to highly anomalous/malicious activity
No public information
No known false positives
Cisco Talos Intelligence Group
MITRE ATT&CK Framework
Tactic: Privilege Escalation
Technique: Exploitation for Privilege Escalation
For reference, see the MITRE ATT&CK vulnerability types here:
Escalation of Privilege
An Escalation of Privilege (EOP) attack is any attack method that results in a user or application gaining permissions to access resources they normally would not have access to.
CVE Additional Information