<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ieinstal — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ieinstal/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ieinstal/feed.xml" rel="self" type="application/rss+xml"/><item><title>UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-uac-bypass-ieinstal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-uac-bypass-ieinstal/</guid><description>This threat brief details a UAC bypass technique leveraging the Internet Explorer Add-On Installer (ieinstal.exe) and Component Object Model (COM) to execute arbitrary code with elevated privileges.</description><content:encoded><![CDATA[<p>This detection rule identifies a User Account Control (UAC) bypass technique that abuses the Internet Explorer Add-On Installer (ieinstal.exe) to launch malicious programs with elevated privileges. Attackers exploit elevated COM interfaces to circumvent UAC, allowing for stealthy code execution. The specific behavior involves executing a program from a temporary directory using ieinstal.exe with the <code>-Embedding</code> argument. This bypass can be utilized to perform various malicious activities, including installing malware, modifying system settings, or establishing persistence. The targeted systems are Windows endpoints where UAC is enabled. This technique matters because it allows attackers to gain unauthorized access with elevated permissions, undermining standard Windows security controls.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system, possibly through phishing or other means.</li>
<li>The attacker drops a malicious executable into a temporary directory, such as <code>C:\Users\&lt;user&gt;\AppData\Local\Temp\IDC*.tmp\</code>.</li>
<li>The attacker invokes <code>ieinstal.exe</code> with the <code>-Embedding</code> argument, specifying the path to the malicious executable.</li>
<li><code>ieinstal.exe</code>, running with elevated privileges, launches the malicious executable due to COM object handling.</li>
<li>The malicious executable executes with elevated privileges, bypassing UAC prompts.</li>
<li>The attacker leverages elevated privileges to perform malicious activities, such as installing malware or modifying system settings.</li>
<li>The attacker establishes persistence to maintain elevated access across system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this UAC bypass technique allows attackers to execute arbitrary code with elevated privileges, bypassing security controls designed to prevent unauthorized system modifications. This can lead to the installation of malware, data theft, or complete system compromise. The severity of the impact is high, as it grants attackers significant control over the affected system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer&rdquo; to your SIEM to detect potential UAC bypass attempts.</li>
<li>Enable Sysmon process creation logging to capture the necessary events for the Sigma rule to function correctly.</li>
<li>Monitor process execution from temporary directories, specifically those matching the pattern <code>C:\\*\\AppData\\*\\Temp\\IDC*.tmp\\*.exe</code>.</li>
<li>Investigate any instances of <code>ieinstal.exe</code> being executed with the <code>-Embedding</code> argument, as this is a key indicator of the UAC bypass attempt.</li>
<li>Implement application whitelisting to prevent unauthorized executables from running, particularly those in temporary directories.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>uac-bypass</category><category>privilege-escalation</category><category>com</category><category>ieinstal</category></item></channel></rss>