Skip to content

Commit dfddc6a

Browse files
committed
feat(rules): Add UAC bypass via command handler hijacking rule
Detects attempts to bypass User Account Control (UAC) by hijacking command handler registry keys associated with auto-elevated system components. Attackers abuse this technique to redirect execution flow and spawn elevated processes without user consent.
1 parent ed9b5bb commit dfddc6a

1 file changed

Lines changed: 46 additions & 0 deletions

File tree

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
name: UAC bypass via command handler hijacking
2+
id: 77bf73f2-d610-4212-a481-adcb6124cc3e
3+
version: 1.0.0
4+
description: |
5+
Detects attempts to bypass User Account Control (UAC) by hijacking command
6+
handler registry keys associated with auto-elevated system components.
7+
Attackers abuse this technique to redirect execution flow and spawn elevated
8+
processes without user consent.
9+
labels:
10+
tactic.id: TA0004
11+
tactic.name: Privilege Escalation
12+
tactic.ref: https://attack.mitre.org/tactics/TA0004/
13+
technique.id: T1548
14+
technique.name: Abuse Elevation Control Mechanism
15+
technique.ref: https://attack.mitre.org/techniques/T1548/
16+
subtechnique.id: T1548.002
17+
subtechnique.name: Bypass User Account Control
18+
subtechnique.ref: https://attack.mitre.org/techniques/T1548/002/
19+
references:
20+
- https://github.com/hfiref0x/UACME
21+
22+
condition: >
23+
sequence
24+
maxspan 1m
25+
|set_value and
26+
registry.path imatches
27+
(
28+
'HKEY_USERS\\S-1-5-21-*_CLASSES\\MS-SETTINGS\\SHELL\\OPEN\\COMMAND\\*',
29+
'HKEY_USERS\\S-1-5-21-*_CLASSES\\LAUNCHER.SYSTEMSETTINGS\\SHELL\\OPEN\\COMMAND\\*',
30+
'HKEY_USERS\\S-1-5-21-*_CLASSES\\MS-SETTINGS\\CURVER\\*',
31+
'HKEY_USERS\\S-1-5-21-*_CLASSES\\MS-SETTINGS\\URL Protocol',
32+
'HKEY_USERS\\S-1-5-21-*_CLASSES\\MS-WINDOWS-STORE\\URL Protocol'
33+
)
34+
|
35+
|spawn_process and
36+
ps.token.integrity_level = 'HIGH' and
37+
ps.exe not imatches
38+
(
39+
'?:\\Windows\\System32\\WerFault.exe',
40+
'?:\\Windows\\SysWOW64\\WerFault.exe'
41+
)
42+
|
43+
44+
severity: high
45+
46+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)