Skip to content

Commit a2ec472

Browse files
committed
feat(rules): Add UAC bypass via trusted Windows directory masquerading rule
Identifies an attempt to bypass User Account Control (UAC) by masquerading as a Microsoft trusted Windows directory. Adversaries abuse UAC bypass to execute code with elevated privileges.
1 parent 4894a7f commit a2ec472

File tree

1 file changed

+37
-0
lines changed

1 file changed

+37
-0
lines changed
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
name: UAC bypass via trusted Windows directory masquerading
2+
id: ae80219c-a083-41ed-97e0-c8e9e2428400
3+
version: 1.0.0
4+
description: |
5+
Identifies an attempt to bypass User Account Control (UAC) by masquerading as a
6+
Microsoft trusted Windows directory. Adversaries abuse UAC bypass to execute code
7+
with elevated privileges.
8+
labels:
9+
tactic.id: TA0004
10+
tactic.name: Privilege Escalation
11+
tactic.ref: https://attack.mitre.org/tactics/TA0004/
12+
technique.id: T1548
13+
technique.name: Abuse Elevation Control Mechanism
14+
technique.ref: https://attack.mitre.org/techniques/T1548/
15+
subtechnique.id: T1548.002
16+
subtechnique.name: Bypass User Account Control
17+
subtechnique.ref: https://attack.mitre.org/techniques/T1548/002/
18+
references:
19+
- https://github.com/hfiref0x/UACME
20+
- https://medium.com/tenable-techblog/uac-bypass-by-mocking-trusted-directories-24a96675f6e
21+
22+
condition: >
23+
spawn_process and
24+
ps.token.integrity_level = 'HIGH' and
25+
ps.cmdline imatches
26+
(
27+
'*:\\Windows \\system32\\*.exe*',
28+
'*:\\Windows \\SysWOW64\\*.exe*',
29+
'*:\\ Windows*\\System32\\*.exe*',
30+
'*:\\ Windows*\\SysWOW64\\*.exe*'
31+
)
32+
action:
33+
- name: kill
34+
35+
severity: high
36+
37+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)