Skip to content

Commit dee9618

Browse files
committed
feat(rules): Add UAC bypass via assembly Native Image Cache hijack rule
Detects attempts to bypass User Account Control (UAC) by hijacking the .NET Native Image Cache (NativeImages) through unauthorized assembly creation followed by execution of a high-integrity process.
1 parent 2532132 commit dee9618

File tree

1 file changed

+43
-0
lines changed

1 file changed

+43
-0
lines changed
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
name: UAC bypass via assembly Native Image Cache hijack
2+
id: d10685d9-675c-4888-a246-85758e4c4515
3+
version: 1.0.0
4+
description: |
5+
Detects attempts to bypass User Account Control (UAC) by hijacking the
6+
.NET Native Image Cache (NativeImages) through unauthorized assembly
7+
creation followed by execution of a high-integrity process.
8+
labels:
9+
tactic.id: TA0004
10+
tactic.name: Privilege Escalation
11+
tactic.ref: https://attack.mitre.org/tactics/TA0004/
12+
technique.id: T1548
13+
technique.name: Abuse Elevation Control Mechanism
14+
technique.ref: https://attack.mitre.org/techniques/T1548/
15+
subtechnique.id: T1548.002
16+
subtechnique.name: Bypass User Account Control
17+
subtechnique.ref: https://attack.mitre.org/techniques/T1548/002/
18+
references:
19+
- https://github.com/hfiref0x/UACME
20+
21+
condition: >
22+
sequence
23+
maxspan 1m
24+
|create_file and
25+
evt.pid != 4 and ps.sid != 'S-1-5-18' and
26+
file.path imatches '?:\\WINDOWS\\assembly\\NativeImages_*\\*.dll' and
27+
ps.exe not imatches
28+
(
29+
'?:\\Windows\\Microsoft.NET\\Framework\\*\\ngen.exe',
30+
'?:\\Windows\\Microsoft.NET\\Framework64\\*\\ngen.exe',
31+
'?:\\Windows\\Microsoft.NET\\Framework\\*\\mscorsvw.exe',
32+
'?:\\Windows\\Microsoft.NET\\Framework64\\*\\mscorsvw.exe',
33+
'?:\\Windows\\servicing\\TrustedInstaller.exe'
34+
)
35+
| as e1
36+
|spawn_process and
37+
ps.token.integrity_level = 'HIGH' and
38+
thread.callstack.summary imatches concat('ntdll.dll|KernelBase.dll|*', $e1.file.name, '|*')
39+
|
40+
41+
severity: high
42+
43+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)