SigmaHQ/rules/windows/registry_event/sysmon_uac_bypass_sdclt.yml
2020-11-20 01:42:17 -03:00

28 lines
822 B
YAML
Executable File

title: UAC Bypass via Sdclt
id: 5b872a46-3b90-45c1-8419-f675db8053aa
status: experimental
description: Detects changes to HKCU:\Software\Classes\exefile\shell\runas\command\isolatedCommand
references:
- https://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe/
author: Omer Yampel
date: 2017/03/17
modified: 2020/09/06
logsource:
category: registry_event
product: windows
detection:
selection:
# usrclass.dat is mounted on HKU\USERSID_Classes\...
TargetObject|startswith: 'HKU\'
TargetObject|endswith: '_Classes\exefile\shell\runas\command\isolatedCommand'
condition: selection
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1088 # an old one
- attack.t1548.002
- car.2019-04-001
falsepositives:
- unknown
level: high