Skip to content
Threat Feed
medium advisory

SeDebugPrivilege Enabled by a Suspicious Process

The rule identifies a process running with a non-SYSTEM account that enables the SeDebugPrivilege privilege, which can be used by adversaries to debug and modify other processes to escalate privileges and bypass access controls.

This detection rule identifies processes running under non-SYSTEM accounts that enable the SeDebugPrivilege. This privilege, typically reserved for system-level tasks, allows a process to debug and modify other processes. Adversaries may enable SeDebugPrivilege to escalate their privileges and bypass access controls, potentially gaining unauthorized access to sensitive data or system resources. The rule aims to detect suspicious processes enabling this privilege, excluding known legitimate processes, to flag potential privilege escalation attempts. This rule was last updated on 2026-05-04.

Attack Chain

  1. An attacker gains initial access to a Windows system through various means (e.g., phishing, exploiting a vulnerability).
  2. The attacker executes a malicious process on the compromised system.
  3. The malicious process attempts to enable the SeDebugPrivilege.
  4. Windows Security Auditing logs a “Token Right Adjusted Events” event, indicating that a process has enabled SeDebugPrivilege.
  5. The detection rule identifies the event, filtering out known legitimate processes that may legitimately enable this privilege (e.g., msiexec.exe, taskhostw.exe).
  6. The rule triggers an alert, indicating a potential privilege escalation attempt.
  7. Security analysts investigate the alert to determine the legitimacy of the process enabling SeDebugPrivilege and the context of its execution.

Impact

Successful exploitation and enabling of SeDebugPrivilege can allow an attacker to debug and modify other processes, potentially gaining access to sensitive information, escalating privileges to SYSTEM level, and bypassing security controls. This can lead to a complete compromise of the affected system and potentially lateral movement to other systems on the network. The impact is high, especially in environments where sensitive data is processed or stored.

Recommendation

  • Enable Audit Token Right Adjusted Events to ensure proper logging of SeDebugPrivilege usage as per the setup instructions.
  • Deploy the “SeDebugPrivilege Enabled by a Suspicious Process” Sigma rule to your SIEM to detect potential privilege escalation attempts.
  • Review and tune the exclusion list in the Sigma rule to minimize false positives, considering legitimate processes in your environment, as described in the False positive analysis.
  • Investigate any alerts generated by the Sigma rule to determine the legitimacy of the process enabling SeDebugPrivilege.
  • Monitor systems for unauthorized access or lateral movement following the detection of SeDebugPrivilege enabling.

Detection coverage 2

SeDebugPrivilege Enabled by Non-System Process

medium

Detects a process running with a non-SYSTEM account enabling SeDebugPrivilege, potentially indicating privilege escalation.

sigma tactics: privilege_escalation techniques: T1134 sources: process_creation, windows

Token Right Adjusted Events - SeDebugPrivilege Enabled

medium

Detects Token Right Adjusted Events where SeDebugPrivilege is enabled by a non-system process.

sigma tactics: privilege_escalation techniques: T1134 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →