|
| 1 | +name: UAC bypass via assembly Native Image Cache hijack |
| 2 | +id: d10685d9-675c-4888-a246-85758e4c4515 |
| 3 | +version: 1.0.0 |
| 4 | +description: | |
| 5 | + Detects attempts to bypass User Account Control (UAC) by hijacking the |
| 6 | + .NET Native Image Cache (NativeImages) through unauthorized assembly |
| 7 | + creation followed by execution of a high-integrity process. |
| 8 | +labels: |
| 9 | + tactic.id: TA0004 |
| 10 | + tactic.name: Privilege Escalation |
| 11 | + tactic.ref: https://attack.mitre.org/tactics/TA0004/ |
| 12 | + technique.id: T1548 |
| 13 | + technique.name: Abuse Elevation Control Mechanism |
| 14 | + technique.ref: https://attack.mitre.org/techniques/T1548/ |
| 15 | + subtechnique.id: T1548.002 |
| 16 | + subtechnique.name: Bypass User Account Control |
| 17 | + subtechnique.ref: https://attack.mitre.org/techniques/T1548/002/ |
| 18 | +references: |
| 19 | + - https://github.com/hfiref0x/UACME |
| 20 | + |
| 21 | +condition: > |
| 22 | + sequence |
| 23 | + maxspan 1m |
| 24 | + |create_file and |
| 25 | + evt.pid != 4 and ps.sid != 'S-1-5-18' and |
| 26 | + file.path imatches '?:\\WINDOWS\\assembly\\NativeImages_*\\*.dll' and |
| 27 | + ps.exe not imatches |
| 28 | + ( |
| 29 | + '?:\\Windows\\Microsoft.NET\\Framework\\*\\ngen.exe', |
| 30 | + '?:\\Windows\\Microsoft.NET\\Framework64\\*\\ngen.exe', |
| 31 | + '?:\\Windows\\Microsoft.NET\\Framework\\*\\mscorsvw.exe', |
| 32 | + '?:\\Windows\\Microsoft.NET\\Framework64\\*\\mscorsvw.exe', |
| 33 | + '?:\\Windows\\servicing\\TrustedInstaller.exe' |
| 34 | + ) |
| 35 | + | as e1 |
| 36 | + |spawn_process and |
| 37 | + ps.token.integrity_level = 'HIGH' and |
| 38 | + thread.callstack.summary imatches concat('ntdll.dll|KernelBase.dll|*', $e1.file.name, '|*') |
| 39 | + | |
| 40 | +
|
| 41 | +severity: high |
| 42 | + |
| 43 | +min-engine-version: 3.0.0 |
0 commit comments