Merge pull request #1077 from uchakin/oscd

[OSCD] UAC bypass added
This commit is contained in:
yugoslavskiy 2021-01-05 23:06:24 +03:00 committed by GitHub
commit c7e9522f29
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 89 additions and 0 deletions

View File

@ -0,0 +1,31 @@
title: UAC Bypass With Fake DLL
id: a5ea83a7-05a5-44c1-be2e-addccbbd8c03
status: experimental
description: Attempts to load dismcore.dll after dropping it
references:
- https://steemit.com/utopian-io/@ah101/uac-bypassing-utility
tags:
- attack.persistence
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002
- attack.t1574.002
author: oscd.community, Dmitry Uchakin
date: 2020/10/06
logsource:
category: image_load
product: windows
detection:
selection:
Image|endswith:
- '\dism.exe'
ImageLoaded|endswith:
- '\dismcore.dll'
filter:
ImageLoaded:
- 'C:\Windows\System32\Dism\dismcore.dll'
condition: selection
falsepositives:
- Pentests
- Actions of a legitimate telnet client
level: high

View File

@ -0,0 +1,29 @@
title: Load Undocumented Autoelevated COM Interface
id: fb3722e4-1a06-46b6-b772-253e2e7db933
status: experimental
description: COM interface (EditionUpgradeManager) that is not used by standard executables.
references:
- https://www.snip2code.com/Snippet/4397378/UAC-bypass-using-EditionUpgradeManager-C/
- https://gist.github.com/hfiref0x/de9c83966623236f5ebf8d9ae2407611
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002
author: oscd.community, Dmitry Uchakin
date: 2020/10/07
logsource:
category: process_access
product: windows
detection:
selection:
CallTrace|contains: 'editionupgrademanagerobj.dll'
condition: selection
fields:
- ComputerName
- User
- SourceImage
- TargetImage
- CallTrace
falsepositives:
- unknown
level: high

View File

@ -0,0 +1,29 @@
title: UAC Bypass Via Wsreset
id: 6ea3bf32-9680-422d-9f50-e90716b12a66
status: experimental
description: Unfixed method for UAC bypass from windows 10. WSReset.exe file associated with the Windows Store. It will run a binary file contained in a low-privilege registry.
references:
- https://www.bleepingcomputer.com/news/security/trickbot-uses-a-new-windows-10-uac-bypass-to-launch-quietly
- https://lolbas-project.github.io/lolbas/Binaries/Wsreset
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002
author: oscd.community, Dmitry Uchakin
date: 2020/10/07
logsource:
category: registry_event
product: windows
detection:
selection:
TargetObject|endswith:
- '\AppX82a6gwre4fdg3bt635tn5ctqjf8msdd2\Shell\open\command'
condition: selection
fields:
- ComputerName
- Image
- EventType
- TargetObject
falsepositives:
- unknown
level: high