Potential Modification of Accessibility Binaries for Persistence
Adversaries may modify or replace Windows accessibility binaries (e.g., sethc.exe, utilman.exe) to execute malicious commands or establish persistence mechanisms before a user logs in, potentially leading to elevated privileges and unauthorized access.
Windows accessibility features, such as Narrator, Magnifier, and On-Screen Keyboard, are designed to assist users with disabilities and can be launched from the login screen using specific key combinations. Attackers can abuse this functionality by replacing legitimate accessibility binaries with malicious executables, allowing them to execute arbitrary commands with SYSTEM privileges before a user logs in. This technique is often used for persistence, privilege escalation, and establishing backdoors. The detection focuses on identifying processes launched by accessibility features with unexpected original file names, which may indicate malicious replacement or modification. Successful exploitation allows an attacker to bypass standard login procedures and gain unauthorized access to the system with elevated privileges.
Attack Chain
- An attacker gains initial access to the system (e.g., via compromised credentials or remote access).
- The attacker identifies the accessibility binaries (e.g.,
C:\\Windows\\System32\\sethc.exe,C:\\Windows\\System32\\utilman.exe). - The attacker replaces a legitimate accessibility binary with a malicious executable (e.g., a reverse shell or command interpreter) using tools like
takeownandicaclsto modify file permissions. - The attacker configures the system to launch the malicious executable when the corresponding accessibility feature is invoked from the login screen.
- The system is rebooted or locked, presenting the login screen.
- The attacker invokes the replaced accessibility feature using the associated key combination (e.g., pressing Shift five times for Sticky Keys/sethc.exe).
- The malicious executable is launched with SYSTEM privileges, providing the attacker with a command prompt or remote access shell.
- The attacker performs malicious actions, such as creating new accounts, installing malware, or exfiltrating data.
Impact
Successful exploitation of this technique allows attackers to gain persistent, elevated access to the compromised system. The attacker can bypass normal login procedures and execute commands with SYSTEM privileges. This can lead to complete system compromise, data theft, and the installation of persistent backdoors. The scope can range from a single workstation to multiple systems within an organization if the attacker is able to automate the replacement process.
Recommendation
- Deploy the “Potential Modification of Accessibility Binaries” Sigma rule to your SIEM to detect unauthorized modifications of accessibility binaries.
- Enable Sysmon process-creation logging to provide the necessary data for the Sigma rule.
- Monitor for processes spawned by
Utilman.exeorwinlogon.exewith a user context of “SYSTEM” and an unexpectedprocess.pe.original_file_nameas defined in the Sigma rule. - Implement strict file permission controls on accessibility binaries in
C:\\Windows\\System32\\to prevent unauthorized modification. - Regularly audit and verify the integrity of accessibility binaries to detect any unauthorized changes.
Detection coverage 2
Detect Accessibility Binary Replacement via Original Filename
highDetects the replacement of accessibility binaries by monitoring process creations where the original filename does not match the expected executable name but is spawned by utilman.exe or winlogon.exe as SYSTEM.
Detect Accessibility Binary launched from unexpected path
mediumDetects accessibility binaries launched from unusual paths, indicating potential hijacking.
Detection queries are available on the platform. Get full rules →