|
| 1 | +name: UAC bypass via command handler hijacking |
| 2 | +id: 77bf73f2-d610-4212-a481-adcb6124cc3e |
| 3 | +version: 1.0.0 |
| 4 | +description: | |
| 5 | + Detects attempts to bypass User Account Control (UAC) by hijacking command |
| 6 | + handler registry keys associated with auto-elevated system components. |
| 7 | + Attackers abuse this technique to redirect execution flow and spawn elevated |
| 8 | + processes without user consent. |
| 9 | +labels: |
| 10 | + tactic.id: TA0004 |
| 11 | + tactic.name: Privilege Escalation |
| 12 | + tactic.ref: https://attack.mitre.org/tactics/TA0004/ |
| 13 | + technique.id: T1548 |
| 14 | + technique.name: Abuse Elevation Control Mechanism |
| 15 | + technique.ref: https://attack.mitre.org/techniques/T1548/ |
| 16 | + subtechnique.id: T1548.002 |
| 17 | + subtechnique.name: Bypass User Account Control |
| 18 | + subtechnique.ref: https://attack.mitre.org/techniques/T1548/002/ |
| 19 | +references: |
| 20 | + - https://github.com/hfiref0x/UACME |
| 21 | + |
| 22 | +condition: > |
| 23 | + sequence |
| 24 | + maxspan 1m |
| 25 | + |set_value and |
| 26 | + registry.path imatches |
| 27 | + ( |
| 28 | + 'HKEY_USERS\\S-1-5-21-*_CLASSES\\MS-SETTINGS\\SHELL\\OPEN\\COMMAND\\*', |
| 29 | + 'HKEY_USERS\\S-1-5-21-*_CLASSES\\LAUNCHER.SYSTEMSETTINGS\\SHELL\\OPEN\\COMMAND\\*', |
| 30 | + 'HKEY_USERS\\S-1-5-21-*_CLASSES\\MS-SETTINGS\\CURVER\\*', |
| 31 | + 'HKEY_USERS\\S-1-5-21-*_CLASSES\\MS-SETTINGS\\URL Protocol', |
| 32 | + 'HKEY_USERS\\S-1-5-21-*_CLASSES\\MS-WINDOWS-STORE\\URL Protocol' |
| 33 | + ) |
| 34 | + | |
| 35 | + |spawn_process and |
| 36 | + ps.token.integrity_level = 'HIGH' and |
| 37 | + ps.exe not imatches |
| 38 | + ( |
| 39 | + '?:\\Windows\\System32\\WerFault.exe', |
| 40 | + '?:\\Windows\\SysWOW64\\WerFault.exe' |
| 41 | + ) |
| 42 | + | |
| 43 | +
|
| 44 | +severity: high |
| 45 | + |
| 46 | +min-engine-version: 3.0.0 |
0 commit comments