<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Accessibility_features — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/accessibility_features/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 18:39:57 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/accessibility_features/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Modification of Accessibility Binaries for Persistence</title><link>https://feed.craftedsignal.io/briefs/2026-05-accessibility-binary-modification/</link><pubDate>Tue, 12 May 2026 18:39:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-accessibility-binary-modification/</guid><description>Adversaries may modify or replace Windows accessibility binaries (e.g., sethc.exe, utilman.exe) to execute malicious commands or establish persistence mechanisms before a user logs in, potentially leading to elevated privileges and unauthorized access.</description><content:encoded><![CDATA[<p>Windows accessibility features, such as Narrator, Magnifier, and On-Screen Keyboard, are designed to assist users with disabilities and can be launched from the login screen using specific key combinations. Attackers can abuse this functionality by replacing legitimate accessibility binaries with malicious executables, allowing them to execute arbitrary commands with SYSTEM privileges before a user logs in. This technique is often used for persistence, privilege escalation, and establishing backdoors. The detection focuses on identifying processes launched by accessibility features with unexpected original file names, which may indicate malicious replacement or modification. Successful exploitation allows an attacker to bypass standard login procedures and gain unauthorized access to the system with elevated privileges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., via compromised credentials or remote access).</li>
<li>The attacker identifies the accessibility binaries (e.g., <code>C:\\Windows\\System32\\sethc.exe</code>, <code>C:\\Windows\\System32\\utilman.exe</code>).</li>
<li>The attacker replaces a legitimate accessibility binary with a malicious executable (e.g., a reverse shell or command interpreter) using tools like <code>takeown</code> and <code>icacls</code> to modify file permissions.</li>
<li>The attacker configures the system to launch the malicious executable when the corresponding accessibility feature is invoked from the login screen.</li>
<li>The system is rebooted or locked, presenting the login screen.</li>
<li>The attacker invokes the replaced accessibility feature using the associated key combination (e.g., pressing Shift five times for Sticky Keys/sethc.exe).</li>
<li>The malicious executable is launched with SYSTEM privileges, providing the attacker with a command prompt or remote access shell.</li>
<li>The attacker performs malicious actions, such as creating new accounts, installing malware, or exfiltrating data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique allows attackers to gain persistent, elevated access to the compromised system. The attacker can bypass normal login procedures and execute commands with SYSTEM privileges. This can lead to complete system compromise, data theft, and the installation of persistent backdoors. The scope can range from a single workstation to multiple systems within an organization if the attacker is able to automate the replacement process.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Potential Modification of Accessibility Binaries&rdquo; Sigma rule to your SIEM to detect unauthorized modifications of accessibility binaries.</li>
<li>Enable Sysmon process-creation logging to provide the necessary data for the Sigma rule.</li>
<li>Monitor for processes spawned by <code>Utilman.exe</code> or <code>winlogon.exe</code> with a user context of &ldquo;SYSTEM&rdquo; and an unexpected <code>process.pe.original_file_name</code> as defined in the Sigma rule.</li>
<li>Implement strict file permission controls on accessibility binaries in <code>C:\\Windows\\System32\\</code> to prevent unauthorized modification.</li>
<li>Regularly audit and verify the integrity of accessibility binaries to detect any unauthorized changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>persistence</category><category>privilege_escalation</category><category>accessibility_features</category></item></channel></rss>