Skip to content

Commit b86b9ca

Browse files
committed
feat(rules) Add Fake system root environment variable manipulation rule
Identifies attempts to manipulate user-scoped Windows directory registry values to point to non-standard locations, a technique commonly abused to fake the system root directory and enable privilege escalation.
1 parent d80bafc commit b86b9ca

File tree

1 file changed

+35
-0
lines changed

1 file changed

+35
-0
lines changed
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
name: Fake system root environment variable manipulation
2+
id: 15613558-14cc-4d00-b13e-392df61e29c4
3+
version: 1.0.0
4+
description: |
5+
Identifies attempts to manipulate user-scoped Windows directory registry values
6+
to point to non-standard locations, a technique commonly abused to fake the system
7+
root directory and enable privilege escalation.
8+
labels:
9+
tactic.id: TA0004
10+
tactic.name: Privilege Escalation
11+
tactic.ref: https://attack.mitre.org/tactics/TA0004/
12+
technique.id: T1068
13+
technique.name: Exploitation for Privilege Escalation
14+
technique.ref: https://attack.mitre.org/techniques/T1068/
15+
references:
16+
- https://github.com/hfiref0x/UACME
17+
18+
condition: >
19+
set_value and
20+
ps.sid != 'S-1-5-18' and
21+
registry.path imatches
22+
(
23+
'HKEY_CURRENT_USER\\*\\windir',
24+
'HKEY_CURRENT_USER\\*\\systemroot'
25+
) and
26+
registry.data not imatches
27+
(
28+
'?:\\windows',
29+
'?SystemRoot?'
30+
) and
31+
registry.path not imatches 'HKEY_CURRENT_USER\\*\\SOFTWARE\\*'
32+
33+
severity: high
34+
35+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)