Skip to content

Commit ed9b5bb

Browse files
committed
feat(rules): Add UAC bypass via CDSSync scheduled task hijack rule
Identifies attempts to bypass User Account Control (UAC) by hijacking the CDSSync scheduled task through a malicious npmproxy.dll. Such behavior is indicative of a UAC bypass technique where attackers abuse auto-elevated scheduled tasks to execute code with elevated privileges.
1 parent dee9618 commit ed9b5bb

File tree

1 file changed

+43
-0
lines changed

1 file changed

+43
-0
lines changed
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
name: UAC bypass via CDSSync scheduled task hijack
2+
id: 7de08df3-c2ab-4632-ab26-37e617815edb
3+
version: 1.0.0
4+
description: |
5+
Identifies attempts to bypass User Account Control (UAC) by hijacking the CDSSync
6+
scheduled task through a malicious npmproxy.dll. Such behavior is indicative of a
7+
UAC bypass technique where attackers abuse auto-elevated scheduled tasks to execute
8+
code with elevated privileges.
9+
labels:
10+
tactic.id: TA0004
11+
tactic.name: Privilege Escalation
12+
tactic.ref: https://attack.mitre.org/tactics/TA0004/
13+
technique.id: T1548
14+
technique.name: Abuse Elevation Control Mechanism
15+
technique.ref: https://attack.mitre.org/techniques/T1548/
16+
subtechnique.id: T1548.002
17+
subtechnique.name: Bypass User Account Control
18+
subtechnique.ref: https://attack.mitre.org/techniques/T1548/002/
19+
references:
20+
- https://www.elastic.co/de/security-labs/exploring-windows-uac-bypasses-techniques-and-detection-strategies
21+
22+
condition: >
23+
sequence
24+
maxspan 1m
25+
|create_file and
26+
file.path imatches '?:\\*\\System32\\npmproxy.dll' and
27+
file.path not imatches
28+
(
29+
'?:\\Windows\\System32\\npmproxy.dll',
30+
'?:\\Windows\\SysWOW64\\npmproxy.dll'
31+
)
32+
| as e1
33+
|spawn_process and
34+
ps.name ~= 'taskhostw.exe' and ps.token.integrity_level = 'HIGH' and
35+
thread.callstack.summary imatches concat('ntdll.dll|KernelBase.dll|kernel32.dll|npmproxy.dll|*', base($e1.file.path), '|*') and
36+
ps.exe not imatches '?:\\Windows\\System32\\WinSAT.exe'
37+
|
38+
action:
39+
- name: kill
40+
41+
severity: high
42+
43+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)