54 lines
1.7 KiB
YAML
54 lines
1.7 KiB
YAML
title: UAC Bypass Using Registry Shell Open Keys
|
|
author: Christian Burkard
|
|
date: 2021/08/30
|
|
description: Detects the pattern of UAC Bypass using fodhelper.exe, computerdefaults.exe,
|
|
slui.exe via registry keys (e.g. UACMe 33 or 62)
|
|
detection:
|
|
SELECTION_1:
|
|
EventID: 12
|
|
SELECTION_10:
|
|
TargetObject: '*Classes\ms-settings\shell\open\command\(Default)'
|
|
SELECTION_11:
|
|
TargetObject: '*Classes\exefile\shell\open\command\(Default)'
|
|
SELECTION_12:
|
|
Details: (Empty)
|
|
SELECTION_2:
|
|
EventID: 13
|
|
SELECTION_3:
|
|
EventID: 14
|
|
SELECTION_4:
|
|
TargetObject: '*Classes\ms-settings\shell\open\command\SymbolicLinkValue'
|
|
SELECTION_5:
|
|
Details: '*\Software\Classes\{*'
|
|
SELECTION_6:
|
|
TargetObject: '*Classes\ms-settings\shell\open\command\DelegateExecute'
|
|
SELECTION_7:
|
|
EventID: 12
|
|
SELECTION_8:
|
|
EventID: 13
|
|
SELECTION_9:
|
|
EventID: 14
|
|
condition: ((SELECTION_1 or SELECTION_2 or SELECTION_3) and (((SELECTION_4 and
|
|
SELECTION_5) or SELECTION_6) or ((SELECTION_7 or SELECTION_8 or SELECTION_9)
|
|
and (SELECTION_10 or SELECTION_11) and not (SELECTION_12))))
|
|
falsepositives:
|
|
- Unknown
|
|
id: 152f3630-77c1-4284-bcc0-4cc68ab2f6e7
|
|
level: high
|
|
logsource:
|
|
category: registry_event
|
|
product: windows
|
|
modified: 2021/09/17
|
|
references:
|
|
- https://github.com/hfiref0x/UACME
|
|
- https://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass/
|
|
- https://github.com/RhinoSecurityLabs/Aggressor-Scripts/tree/master/UACBypass
|
|
status: experimental
|
|
tags:
|
|
- attack.defense_evasion
|
|
- attack.privilege_escalation
|
|
- attack.t1548.002
|
|
yml_filename: sysmon_uac_bypass_shell_open.yml
|
|
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/registry_event
|
|
|