Skip to content

Commit d86c47c

Browse files
committed
feat(rules): Add UAC bypass via .NET Code Profiler DLL Hijack rule
Identifies potential User Account Control (UAC) bypass activity leveraging the .NET Code Profiler mechanism to achieve elevated code execution throughDLL hijacking. Attackers may attempt to load arbitrary profiler libraries into high-integrity processes.
1 parent ce1e980 commit d86c47c

1 file changed

Lines changed: 44 additions & 0 deletions

File tree

Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
name: UAC bypass via .NET Code Profiler DLL Hijack
2+
id: 554f1b0d-c317-4cf0-aaac-d29d6e046b0c
3+
version: 1.0.0
4+
description: |
5+
Identifies potential User Account Control (UAC) bypass activity leveraging
6+
the .NET Code Profiler mechanism to achieve elevated code execution through
7+
DLL hijacking. Attackers may attempt to load arbitrary profiler libraries
8+
into high-integrity processes.
9+
labels:
10+
tactic.id: TA0004
11+
tactic.name: Privilege Escalation
12+
tactic.ref: https://attack.mitre.org/tactics/TA0004/
13+
technique.id: T1548
14+
technique.name: Abuse Elevation Control Mechanism
15+
technique.ref: https://attack.mitre.org/techniques/T1548/
16+
subtechnique.id: T1548.002
17+
subtechnique.name: Bypass User Account Control
18+
subtechnique.ref: https://attack.mitre.org/techniques/T1548/002/
19+
references:
20+
- https://github.com/hfiref0x/UACME
21+
- https://github.com/djhohnstein/.NET-Profiler-DLL-Hijack
22+
23+
condition: >
24+
sequence
25+
maxspan 2m
26+
|set_value and
27+
registry.data imatches '?:\\*.dll' and
28+
registry.path ~= 'HKEY_CURRENT_USER\\Environment\\COR_PROFILER_PATH'
29+
| as e1
30+
|spawn_process and
31+
ps.token.integrity_level = 'HIGH' and
32+
thread.callstack.summary imatches concat('ntdll.dll|KernelBase.dll|advapi32.dll|', base($e1.registry.data), '|*') and
33+
ps.exe not imatches
34+
(
35+
'?:\\Windows\\System32\\WerFault.exe',
36+
'?:\\Windows\\SysWOW64\\WerFault.exe'
37+
)
38+
|
39+
action:
40+
- name: kill
41+
42+
severity: high
43+
44+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)