2020-10-07 19:27:48 +00:00
|
|
|
title: UAC Bypass With Fake DLL
|
2020-10-07 19:06:16 +00:00
|
|
|
id: a5ea83a7-05a5-44c1-be2e-addccbbd8c03
|
|
|
|
status: experimental
|
2020-10-17 19:35:44 +00:00
|
|
|
description: Attempts to load dismcore.dll after dropping it
|
2020-10-07 19:06:16 +00:00
|
|
|
references:
|
|
|
|
- https://steemit.com/utopian-io/@ah101/uac-bypassing-utility
|
|
|
|
tags:
|
|
|
|
- attack.persistence
|
|
|
|
- attack.defense_evasion
|
|
|
|
- attack.privilege_escalation
|
|
|
|
- attack.t1548.002
|
|
|
|
- attack.t1574.002
|
|
|
|
author: oscd.community, Dmitry Uchakin
|
|
|
|
date: 2020/10/06
|
2021-04-02 22:00:43 +00:00
|
|
|
logsource:
|
|
|
|
category: image_load
|
|
|
|
product: windows
|
2020-10-07 19:06:16 +00:00
|
|
|
detection:
|
|
|
|
selection:
|
2020-10-14 16:06:59 +00:00
|
|
|
Image|endswith:
|
2020-10-07 19:06:16 +00:00
|
|
|
- '\dism.exe'
|
2020-10-14 16:06:59 +00:00
|
|
|
ImageLoaded|endswith:
|
2020-10-07 19:06:16 +00:00
|
|
|
- '\dismcore.dll'
|
2020-10-14 16:06:59 +00:00
|
|
|
filter:
|
|
|
|
ImageLoaded:
|
|
|
|
- 'C:\Windows\System32\Dism\dismcore.dll'
|
2020-10-07 19:06:16 +00:00
|
|
|
condition: selection
|
|
|
|
falsepositives:
|
|
|
|
- Pentests
|
|
|
|
- Actions of a legitimate telnet client
|
2020-10-17 19:35:44 +00:00
|
|
|
level: high
|