Skip to content

Commit ce1e980

Browse files
committed
feat(rules): Add UAC bypass via DLL hijack from Windows Media player directory rule
Identifies potential User Account Control (UAC) bypass activity through DLL hijacking involving components loaded from the Windows Media Player installation directory. Adversaries may leverage trusted Windows Media Player binaries or their associated dynamic-link libraries to execute arbitrary code with elevated context.
1 parent 7a06242 commit ce1e980

1 file changed

Lines changed: 37 additions & 0 deletions

File tree

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
name: UAC bypass via DLL hijack from Windows Media player directory
2+
id: a76ea056-a143-454a-8a7e-bffe22604b51
3+
version: 1.0.0
4+
description: |
5+
Identifies potential User Account Control (UAC) bypass activity through DLL hijacking
6+
involving components loaded from the Windows Media Player installation directory.
7+
Adversaries may leverage trusted Windows Media Player binaries or their associated
8+
dynamic-link libraries to execute arbitrary code with elevated context.
9+
labels:
10+
tactic.id: TA0004
11+
tactic.name: Privilege Escalation
12+
tactic.ref: https://attack.mitre.org/tactics/TA0004/
13+
technique.id: T1548
14+
technique.name: Abuse Elevation Control Mechanism
15+
technique.ref: https://attack.mitre.org/techniques/T1548/
16+
subtechnique.id: T1548.002
17+
subtechnique.name: Bypass User Account Control
18+
subtechnique.ref: https://attack.mitre.org/techniques/T1548/002/
19+
20+
condition: >
21+
spawn_process and
22+
ps.token.integrity_level = 'HIGH' and
23+
ps.exe not imatches
24+
(
25+
'?:\\Windows\\System32\\svchost.exe',
26+
'?:\\Program Files\\Windows Media Player\\wmplayer.exe',
27+
'?:\\Program Files (x86)\\Windows Media Player\\wmplayer.exe'
28+
) and
29+
thread.callstack.modules imatches
30+
(
31+
'?:\\Program Files\\Windows Media Player\\*.dll',
32+
'?:\\Program Files (x86)\\Windows Media Player\\*.dll'
33+
)
34+
35+
severity: high
36+
37+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)