Skip to content

Commit 33d18c3

Browse files
committed
feat(rules): Add UAC bypass via ICMLuaUtil COM interface rule
Identifies potential User Account Control (UAC) bypass activity through abuse of the ICMLuaUtil Component Object Model (COM) interface. ICMLuaUtil is an internal Windows COM interface associated with system configuration and elevation-related operations. Because it is registered as an auto-elevated COM object, adversaries can be weaponize it in a manner that results in elevated execution without triggering a standard UAC consent prompt.
1 parent f300930 commit 33d18c3

File tree

1 file changed

+44
-0
lines changed

1 file changed

+44
-0
lines changed
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
name: UAC bypass via ICMLuaUtil COM interface
2+
id: e6acb300-4c0b-4463-a48c-f6abc55cb079
3+
version: 1.0.0
4+
description: |
5+
Identifies potential User Account Control (UAC) bypass activity through abuse
6+
of the ICMLuaUtil Component Object Model (COM) interface. ICMLuaUtil is an
7+
internal Windows COM interface associated with system configuration and
8+
elevation-related operations. Because it is registered as an auto-elevated COM
9+
object, adversaries can be weaponize it in a manner that results in elevated
10+
execution without triggering a standard UAC consent prompt.
11+
labels:
12+
tactic.id: TA0004
13+
tactic.name: Privilege Escalation
14+
tactic.ref: https://attack.mitre.org/tactics/TA0004/
15+
technique.id: T1548
16+
technique.name: Abuse Elevation Control Mechanism
17+
technique.ref: https://attack.mitre.org/techniques/T1548/
18+
subtechnique.id: T1548.002
19+
subtechnique.name: Bypass User Account Control
20+
subtechnique.ref: https://attack.mitre.org/techniques/T1548/002/
21+
references:
22+
- https://github.com/hfiref0x/UACME
23+
- https://gist.github.com/gavz/afa005dd63044c6974c56fb33fd66475
24+
- https://www.linkedin.com/posts/m-hassoub_eventsimplename-threathunting-uacbypass-activity-7418649556999118848-Cuvd
25+
26+
condition: >
27+
spawn_process and
28+
ps.parent.name ~= 'dllhost.exe' and ps.token.integrity_level = 'HIGH' and
29+
ps.parent.cmdline imatches
30+
(
31+
'*D2E7041B-2927-42FB-8E9F-7CE93B6DC937*',
32+
'*3E5FC7F9-9A51-4367-9063-A120244FBEC7*'
33+
) and
34+
ps.exe not imatches
35+
(
36+
'?:\\Windows\\System32\\WerFault.exe',
37+
'?:\\Windows\\SysWOW64\\WerFault.exe'
38+
)
39+
action:
40+
- name: kill
41+
42+
severity: high
43+
44+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)