Suspicious Token Impersonation or SeDebugPrivilege Abuse (E8-06)

E8-06 — Patch Operating Systems ML2 medium experimental
More E8-06 rules
Description
Detects processes requesting SeDebugPrivilege or SeImpersonatePrivilege which are commonly abused in OS-level privilege escalation exploits. When OS patching lags (E8-06 failure), adversaries use local privilege escalation CVEs that depend on token manipulation to achieve SYSTEM. Audit Policy must log Special Logon events (4672) and Process Creation (4688) with command line.
Rule Source (Sigma YAML)
title: Suspicious Token Impersonation or SeDebugPrivilege Abuse (E8-06)
id: 8df26265-3106-4e08-ac9f-e6612ae7a9c5
status: experimental
description: |
    Detects processes requesting SeDebugPrivilege or SeImpersonatePrivilege which
    are commonly abused in OS-level privilege escalation exploits. When OS patching
    lags (E8-06 failure), adversaries use local privilege escalation CVEs that
    depend on token manipulation to achieve SYSTEM. Audit Policy must log Special
    Logon events (4672) and Process Creation (4688) with command line.
references:
    - https://attack.mitre.org/techniques/T1134/
    - https://attack.mitre.org/techniques/T1134/001/
    - https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model
author: Roni Biju
date: 2026-04-12
modified: 2026-04-12
tags:
    - e8.control.06
    - e8.maturity.ml2
    - attack.privilege_escalation
    - attack.t1134
    - attack.t1134.001
logsource:
    product: windows
    service: security
detection:
    selection_special_logon:
        EventID: 4672    # Special privileges assigned to new logon
        PrivilegeList|contains:
            - 'SeDebugPrivilege'
    filter_expected_accounts:
        SubjectUserName|endswith: '$'    # Machine accounts
        SubjectUserName:
            - 'SYSTEM'
            - 'LOCAL SERVICE'
            - 'NETWORK SERVICE'
    condition: selection_special_logon and not filter_expected_accounts
falsepositives:
    - Administrators using debugging tools (WinDbg, Process Monitor, ProcDump)
    - Endpoint security agents that require SeDebugPrivilege
    - Some backup agents
level: medium
custom:
    e8_control: E8-06
    e8_maturity: ML2
    e8_bypass_technique: Token impersonation / privilege escalation via OS vulnerability
    false_positive_rate: medium
    tuning_notes: |
        Suppress on known admin accounts who routinely use debugging tools.
        High-fidelity signal when firing for standard user accounts. Correlate
        with CVE-related process names (e.g., PrintSpoofer, RoguePotato child
        processes) for confirmed exploitation.
Tuning Notes
Suppress on known admin accounts who routinely use debugging tools. High-fidelity signal when firing for standard user accounts. Correlate with CVE-related process names (e.g., PrintSpoofer, RoguePotato child processes) for confirmed exploitation.
E8 Control
Min. Maturity
ML2
Severity
medium
FP Rate
medium
Log Source
windows / security
Rule ID
8df26265-3106-4e08-ac9f-e6612ae7a9c5
File
rules/e8-06-patch-os/e8_06_privilege_escalation_token_impersonation.yml
Bypass Technique
Token impersonation / privilege escalation via OS vulnerability
ATT&CK Techniques
False Positives
  • Administrators using debugging tools (WinDbg, Process Monitor, ProcDump)
  • Endpoint security agents that require SeDebugPrivilege
  • Some backup agents