<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Uac-Bypass — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/uac-bypass/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 24 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/uac-bypass/feed.xml" rel="self" type="application/rss+xml"/><item><title>UAC Bypass via Windows Firewall MMC Snap-In Hijack</title><link>https://feed.craftedsignal.io/briefs/2024-01-uac-bypass-winfw-mmc/</link><pubDate>Wed, 24 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-uac-bypass-winfw-mmc/</guid><description>Attackers bypass User Account Control (UAC) by hijacking the Microsoft Management Console (MMC) Windows Firewall snap-in to execute code with elevated permissions, potentially leading to system compromise.</description><content:encoded><![CDATA[<p>This threat involves the exploitation of a User Account Control (UAC) bypass technique on Windows systems. Attackers leverage the Microsoft Management Console (MMC) and its Windows Firewall snap-in (WF.msc) to execute arbitrary code with elevated privileges. By hijacking this trusted process, malicious actors can circumvent security measures designed to restrict unauthorized access and modifications to the system. This UAC bypass method allows attackers to stealthily execute code, potentially leading to privilege escalation, malware installation, or data exfiltration. The technique is relevant to defenders because it enables attackers to bypass standard security controls, increasing the risk of successful compromise. This activity has been observed in various forms and can be adapted to deliver a range of malicious payloads.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User executes a seemingly benign application or script.</li>
<li>The application triggers the execution of <code>mmc.exe</code> with the <code>WF.msc</code> argument, launching the Windows Firewall snap-in.</li>
<li>A malicious process is spawned as a child process of <code>mmc.exe</code>. This is the key indicator of compromise.</li>
<li>The malicious process exploits a vulnerability or misconfiguration within the MMC snap-in or related components.</li>
<li>The exploited process gains elevated privileges, bypassing UAC restrictions.</li>
<li>The attacker uses these elevated privileges to perform malicious actions, such as installing malware or modifying system settings.</li>
<li>The attacker achieves persistence through registry modifications or scheduled tasks.</li>
<li>The final objective is achieved, such as data exfiltration, system compromise, or lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful UAC bypass can lead to a significant compromise of the targeted system. Attackers can install persistent backdoors, escalate privileges, and gain control over critical system functions. This can result in data theft, system instability, or complete system takeover. The impact is amplified in environments where UAC is relied upon as a primary security control, potentially affecting a large number of systems across an organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;UAC Bypass via Windows Firewall MMC Snap-In Hijack&rdquo; to your SIEM to detect suspicious processes spawned by <code>mmc.exe</code> with the &ldquo;WF.msc&rdquo; argument.</li>
<li>Monitor process creation events for unexpected child processes of <code>mmc.exe</code> using process monitoring tools and tune the Sigma rule accordingly.</li>
<li>Enable process auditing and Sysmon event logging (Event ID 1) to capture detailed information about process creations, as specified in the setup instructions of the original rule.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent process chain and the actions performed by the spawned process.</li>
<li>Refer to the references provided for more information on UAC bypass techniques and mitigation strategies.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>uac-bypass</category><category>privilege-escalation</category><category>windows-firewall</category><category>mmc</category></item><item><title>UAC Bypass via DiskCleanup Scheduled Task Hijack</title><link>https://feed.craftedsignal.io/briefs/2024-01-uac-bypass-diskcleanup/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-uac-bypass-diskcleanup/</guid><description>Attackers bypass User Account Control (UAC) by hijacking the DiskCleanup Scheduled Task to stealthily execute code with elevated permissions on Windows systems.</description><content:encoded><![CDATA[<p>This rule identifies User Account Control (UAC) bypass attempts via hijacking the DiskCleanup Scheduled Task. Attackers exploit this method to execute code with elevated privileges, bypassing standard security controls. The technique involves leveraging the <code>cleanmgr.exe</code> or <code>taskhostw.exe</code> executables with specific arguments (<code>/autoclean</code> and <code>/d</code>) outside of their expected paths. This allows attackers to run malicious code under the guise of a legitimate system process, making detection more challenging. This technique is used to gain elevated privileges on a compromised system, allowing for further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., via phishing or exploiting a software vulnerability).</li>
<li>The attacker modifies or creates a scheduled task to execute <code>cleanmgr.exe</code> or <code>taskhostw.exe</code> with the <code>/autoclean</code> and <code>/d</code> arguments.</li>
<li>The modified scheduled task is triggered, executing the specified executable with the supplied arguments.</li>
<li>The executable, such as <code>cleanmgr.exe</code>, attempts to run Disk Cleanup.</li>
<li>If the executable path is outside the standard locations (e.g., <code>C:\\Windows\\System32</code> or <code>C:\\Windows\\SysWOW64</code>), it indicates a potential hijack.</li>
<li>Malicious code is executed with elevated privileges due to the UAC bypass.</li>
<li>The attacker uses these elevated privileges to install malware, modify system settings, or perform other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass User Account Control (UAC) and execute code with elevated privileges. This can lead to the installation of malware, modification of system settings, data theft, and other malicious activities. While the exact number of victims is unknown, this technique is effective on systems where UAC is enabled but misconfigured or vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;UAC Bypass via DiskCleanup with Suspicious Path&rdquo; to your SIEM and tune for your environment to detect UAC bypass attempts.</li>
<li>Deploy the Sigma rule &ldquo;UAC Bypass via DiskCleanup and Taskhostw&rdquo; to your SIEM to detect UAC bypass attempts.</li>
<li>Monitor process creation events for <code>cleanmgr.exe</code> and <code>taskhostw.exe</code> with the <code>/autoclean</code> and <code>/d</code> arguments, focusing on executions outside the standard system directories.</li>
<li>Review and harden scheduled tasks to prevent unauthorized modifications.</li>
<li>Ensure that UAC settings are properly configured and enforced across the organization.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>uac-bypass</category><category>privilege-escalation</category><category>windows</category><category>diskcleanup</category><category>scheduled-task</category></item><item><title>UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-uac-bypass-ieinstal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-uac-bypass-ieinstal/</guid><description>This threat brief details a UAC bypass technique leveraging the Internet Explorer Add-On Installer (ieinstal.exe) and Component Object Model (COM) to execute arbitrary code with elevated privileges.</description><content:encoded><![CDATA[<p>This detection rule identifies a User Account Control (UAC) bypass technique that abuses the Internet Explorer Add-On Installer (ieinstal.exe) to launch malicious programs with elevated privileges. Attackers exploit elevated COM interfaces to circumvent UAC, allowing for stealthy code execution. The specific behavior involves executing a program from a temporary directory using ieinstal.exe with the <code>-Embedding</code> argument. This bypass can be utilized to perform various malicious activities, including installing malware, modifying system settings, or establishing persistence. The targeted systems are Windows endpoints where UAC is enabled. This technique matters because it allows attackers to gain unauthorized access with elevated permissions, undermining standard Windows security controls.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system, possibly through phishing or other means.</li>
<li>The attacker drops a malicious executable into a temporary directory, such as <code>C:\Users\&lt;user&gt;\AppData\Local\Temp\IDC*.tmp\</code>.</li>
<li>The attacker invokes <code>ieinstal.exe</code> with the <code>-Embedding</code> argument, specifying the path to the malicious executable.</li>
<li><code>ieinstal.exe</code>, running with elevated privileges, launches the malicious executable due to COM object handling.</li>
<li>The malicious executable executes with elevated privileges, bypassing UAC prompts.</li>
<li>The attacker leverages elevated privileges to perform malicious activities, such as installing malware or modifying system settings.</li>
<li>The attacker establishes persistence to maintain elevated access across system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this UAC bypass technique allows attackers to execute arbitrary code with elevated privileges, bypassing security controls designed to prevent unauthorized system modifications. This can lead to the installation of malware, data theft, or complete system compromise. The severity of the impact is high, as it grants attackers significant control over the affected system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer&rdquo; to your SIEM to detect potential UAC bypass attempts.</li>
<li>Enable Sysmon process creation logging to capture the necessary events for the Sigma rule to function correctly.</li>
<li>Monitor process execution from temporary directories, specifically those matching the pattern <code>C:\\*\\AppData\\*\\Temp\\IDC*.tmp\\*.exe</code>.</li>
<li>Investigate any instances of <code>ieinstal.exe</code> being executed with the <code>-Embedding</code> argument, as this is a key indicator of the UAC bypass attempt.</li>
<li>Implement application whitelisting to prevent unauthorized executables from running, particularly those in temporary directories.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>uac-bypass</category><category>privilege-escalation</category><category>com</category><category>ieinstal</category></item></channel></rss>