diff --git a/rules/windows/image_load/sysmon_uac_bypass_via_dism.yml b/rules/windows/image_load/sysmon_uac_bypass_via_dism.yml new file mode 100644 index 00000000..f339f382 --- /dev/null +++ b/rules/windows/image_load/sysmon_uac_bypass_via_dism.yml @@ -0,0 +1,31 @@ +title: UAC Bypass With Fake DLL +id: a5ea83a7-05a5-44c1-be2e-addccbbd8c03 +status: experimental +description: Attempts to load dismcore.dll after dropping it +references: + - https://steemit.com/utopian-io/@ah101/uac-bypassing-utility +tags: + - attack.persistence + - attack.defense_evasion + - attack.privilege_escalation + - attack.t1548.002 + - attack.t1574.002 +author: oscd.community, Dmitry Uchakin +date: 2020/10/06 +logsource: + category: image_load + product: windows +detection: + selection: + Image|endswith: + - '\dism.exe' + ImageLoaded|endswith: + - '\dismcore.dll' + filter: + ImageLoaded: + - 'C:\Windows\System32\Dism\dismcore.dll' + condition: selection +falsepositives: + - Pentests + - Actions of a legitimate telnet client +level: high diff --git a/rules/windows/process_access/sysmon_load_undocumented_autoelevated_com_interface.yml b/rules/windows/process_access/sysmon_load_undocumented_autoelevated_com_interface.yml new file mode 100644 index 00000000..85f1f5fb --- /dev/null +++ b/rules/windows/process_access/sysmon_load_undocumented_autoelevated_com_interface.yml @@ -0,0 +1,29 @@ +title: Load Undocumented Autoelevated COM Interface +id: fb3722e4-1a06-46b6-b772-253e2e7db933 +status: experimental +description: COM interface (EditionUpgradeManager) that is not used by standard executables. +references: + - https://www.snip2code.com/Snippet/4397378/UAC-bypass-using-EditionUpgradeManager-C/ + - https://gist.github.com/hfiref0x/de9c83966623236f5ebf8d9ae2407611 +tags: + - attack.defense_evasion + - attack.privilege_escalation + - attack.t1548.002 +author: oscd.community, Dmitry Uchakin +date: 2020/10/07 +logsource: + category: process_access + product: windows +detection: + selection: + CallTrace|contains: 'editionupgrademanagerobj.dll' + condition: selection +fields: + - ComputerName + - User + - SourceImage + - TargetImage + - CallTrace +falsepositives: + - unknown +level: high \ No newline at end of file diff --git a/rules/windows/registry_event/sysmon_bypass_via_wsreset.yml b/rules/windows/registry_event/sysmon_bypass_via_wsreset.yml new file mode 100644 index 00000000..d20032bd --- /dev/null +++ b/rules/windows/registry_event/sysmon_bypass_via_wsreset.yml @@ -0,0 +1,29 @@ +title: UAC Bypass Via Wsreset +id: 6ea3bf32-9680-422d-9f50-e90716b12a66 +status: experimental +description: Unfixed method for UAC bypass from windows 10. WSReset.exe file associated with the Windows Store. It will run a binary file contained in a low-privilege registry. +references: + - https://www.bleepingcomputer.com/news/security/trickbot-uses-a-new-windows-10-uac-bypass-to-launch-quietly + - https://lolbas-project.github.io/lolbas/Binaries/Wsreset +tags: + - attack.defense_evasion + - attack.privilege_escalation + - attack.t1548.002 +author: oscd.community, Dmitry Uchakin +date: 2020/10/07 +logsource: + category: registry_event + product: windows +detection: + selection: + TargetObject|endswith: + - '\AppX82a6gwre4fdg3bt635tn5ctqjf8msdd2\Shell\open\command' + condition: selection +fields: + - ComputerName + - Image + - EventType + - TargetObject +falsepositives: + - unknown +level: high \ No newline at end of file