Skip to content

feat(rules): New UAC bypass via rouge MMC snap-in rule#627

Merged
rabbitstack merged 1 commit intomasterfrom
privilege_escalation_uac_bypass_via_rouge_mmc_snap-in
Mar 5, 2026
Merged

feat(rules): New UAC bypass via rouge MMC snap-in rule#627
rabbitstack merged 1 commit intomasterfrom
privilege_escalation_uac_bypass_via_rouge_mmc_snap-in

Conversation

@rabbitstack
Copy link
Owner

What is the purpose of this PR / why it is needed?

Detects attempts to bypass User Account Control (UAC) by executing a malicious Microsoft Management Console (MMC) snap-in. Abuse of MMC snap-ins for UAC bypass is typically observed in post-exploitation scenarios where an adversary already has code execution in a user context and is attempting to escalate privileges to administrator.

What type of change does this PR introduce?


Uncomment one or more /kind <> lines:

/kind feature (non-breaking change which adds functionality)

/kind bug-fix (non-breaking change which fixes an issue)

/kind refactor (non-breaking change that restructures the code, while not changing the original functionality)

/kind breaking (fix or feature that would cause existing functionality to not work as expected

/kind cleanup

/kind improvement

/kind design

/kind documentation

/kind other (change that doesn't pertain to any of the above categories)

Any specific area of the project related to this PR?


Uncomment one or more /area <> lines:

/area instrumentation

/area telemetry

/area rule-engine

/area filters

/area yara

/area event

/area captures

/area alertsenders

/area outputs

/area rules

/area filaments

/area config

/area cli

/area tests

/area ci

/area build

/area docs

/area deps

/area evasion

/area other

Special notes for the reviewer


Does this PR introduce a user-facing change?


Detects attempts to bypass User Account Control (UAC) by executing a malicious Microsoft Management Console (MMC) snap-in. Abuse of MMC snap-ins for UAC bypass is typically observed in post-exploitation scenarios where an adversary already has code execution in a user context and is attempting to escalate privileges to administrator.
@rabbitstack rabbitstack added the rules Anything related to detection rules label Feb 19, 2026
@rabbitstack rabbitstack added the rules: uac bypass Anything related to UAC bypass detection rules label Feb 26, 2026
@rabbitstack rabbitstack merged commit 163b19d into master Mar 5, 2026
10 of 11 checks passed
@rabbitstack rabbitstack deleted the privilege_escalation_uac_bypass_via_rouge_mmc_snap-in branch March 5, 2026 19:50
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

rules: uac bypass Anything related to UAC bypass detection rules rules Anything related to detection rules

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant