Files
hayabusa/rules/Sigma/sysmon_uac_bypass_shell_open.yml
2021-11-14 11:00:56 +09:00

54 lines
1.7 KiB
YAML

title: UAC Bypass Using Registry Shell Open Keys
author: Christian Burkard
date: 2021/08/30
description: Detects the pattern of UAC Bypass using fodhelper.exe, computerdefaults.exe,
slui.exe via registry keys (e.g. UACMe 33 or 62)
detection:
SELECTION_1:
EventID: 12
SELECTION_10:
TargetObject: '*Classes\ms-settings\shell\open\command\(Default)'
SELECTION_11:
TargetObject: '*Classes\exefile\shell\open\command\(Default)'
SELECTION_12:
Details: (Empty)
SELECTION_2:
EventID: 13
SELECTION_3:
EventID: 14
SELECTION_4:
TargetObject: '*Classes\ms-settings\shell\open\command\SymbolicLinkValue'
SELECTION_5:
Details: '*\Software\Classes\{*'
SELECTION_6:
TargetObject: '*Classes\ms-settings\shell\open\command\DelegateExecute'
SELECTION_7:
EventID: 12
SELECTION_8:
EventID: 13
SELECTION_9:
EventID: 14
condition: ((SELECTION_1 or SELECTION_2 or SELECTION_3) and (((SELECTION_4 and
SELECTION_5) or SELECTION_6) or ((SELECTION_7 or SELECTION_8 or SELECTION_9)
and (SELECTION_10 or SELECTION_11) and not (SELECTION_12))))
falsepositives:
- Unknown
id: 152f3630-77c1-4284-bcc0-4cc68ab2f6e7
level: high
logsource:
category: registry_event
product: windows
modified: 2021/09/17
references:
- https://github.com/hfiref0x/UACME
- https://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass/
- https://github.com/RhinoSecurityLabs/Aggressor-Scripts/tree/master/UACBypass
status: experimental
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002
yml_filename: sysmon_uac_bypass_shell_open.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/registry_event