<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Mmc — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/mmc/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 24 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/mmc/feed.xml" rel="self" type="application/rss+xml"/><item><title>UAC Bypass via Windows Firewall MMC Snap-In Hijack</title><link>https://feed.craftedsignal.io/briefs/2024-01-uac-bypass-winfw-mmc/</link><pubDate>Wed, 24 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-uac-bypass-winfw-mmc/</guid><description>Attackers bypass User Account Control (UAC) by hijacking the Microsoft Management Console (MMC) Windows Firewall snap-in to execute code with elevated permissions, potentially leading to system compromise.</description><content:encoded><![CDATA[<p>This threat involves the exploitation of a User Account Control (UAC) bypass technique on Windows systems. Attackers leverage the Microsoft Management Console (MMC) and its Windows Firewall snap-in (WF.msc) to execute arbitrary code with elevated privileges. By hijacking this trusted process, malicious actors can circumvent security measures designed to restrict unauthorized access and modifications to the system. This UAC bypass method allows attackers to stealthily execute code, potentially leading to privilege escalation, malware installation, or data exfiltration. The technique is relevant to defenders because it enables attackers to bypass standard security controls, increasing the risk of successful compromise. This activity has been observed in various forms and can be adapted to deliver a range of malicious payloads.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User executes a seemingly benign application or script.</li>
<li>The application triggers the execution of <code>mmc.exe</code> with the <code>WF.msc</code> argument, launching the Windows Firewall snap-in.</li>
<li>A malicious process is spawned as a child process of <code>mmc.exe</code>. This is the key indicator of compromise.</li>
<li>The malicious process exploits a vulnerability or misconfiguration within the MMC snap-in or related components.</li>
<li>The exploited process gains elevated privileges, bypassing UAC restrictions.</li>
<li>The attacker uses these elevated privileges to perform malicious actions, such as installing malware or modifying system settings.</li>
<li>The attacker achieves persistence through registry modifications or scheduled tasks.</li>
<li>The final objective is achieved, such as data exfiltration, system compromise, or lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful UAC bypass can lead to a significant compromise of the targeted system. Attackers can install persistent backdoors, escalate privileges, and gain control over critical system functions. This can result in data theft, system instability, or complete system takeover. The impact is amplified in environments where UAC is relied upon as a primary security control, potentially affecting a large number of systems across an organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;UAC Bypass via Windows Firewall MMC Snap-In Hijack&rdquo; to your SIEM to detect suspicious processes spawned by <code>mmc.exe</code> with the &ldquo;WF.msc&rdquo; argument.</li>
<li>Monitor process creation events for unexpected child processes of <code>mmc.exe</code> using process monitoring tools and tune the Sigma rule accordingly.</li>
<li>Enable process auditing and Sysmon event logging (Event ID 1) to capture detailed information about process creations, as specified in the setup instructions of the original rule.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent process chain and the actions performed by the spawned process.</li>
<li>Refer to the references provided for more information on UAC bypass techniques and mitigation strategies.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>uac-bypass</category><category>privilege-escalation</category><category>windows-firewall</category><category>mmc</category></item></channel></rss>