Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add slui.yml, fodhelper.yml, regedit.yml #401

Open
wants to merge 6 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
25 changes: 25 additions & 0 deletions yml/OSBinaries/ComputerDefaults.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
---
Name: ComputerDefaults.exe
Description: ComputerDefaults.exe is a Windows system utility for managing default applications for tasks like web browsing, emailing, and media playback.
Author: Eron Clarke
Created: 2024-09-24
Commands:
- Command: ComputerDefaults.exe
Description: Upon execution, ComputerDefaults.exe checks two registry values at HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\open\command; if these are set by an attacker, the set command will be executed as a high-integrity process without a UAC prompt being displayed to the user. See 'resources' for which registry keys/values to set.
Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
Category: UAC Bypass
Privileges: User
MitreID: T1548.002
OperatingSystem: Windows 10, Windows 11
Full_Path:
- Path: C:\Windows\System32\ComputerDefaults.exe
- Path: C:\Windows\SysWOW64\ComputerDefaults.exe
Detection:
- IOC: Event ID 10
- IOC: A binary or script spawned as a child process of ComputerDefaults.exe
- IOC: Changes to HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\open\command
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_uac_bypass_computerdefaults.yml
Resources:
- Link: https://gist.github.com/havoc3-3/812547525107bd138a1a839118a3a44b
Acknowledgement:
- Person: Eron Clarke
24 changes: 24 additions & 0 deletions yml/OSBinaries/fodhelper.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
---
Name: fodhelper.exe
Description: fodhelper.exe is a Windows system utility used for managing optional features and components.
Author: Eron Clarke
Created: 2024-09-26
Commands:
- Command: fodhelper.exe
Description: Upon execution, fodhelper.exe checks two registry values at HKEY_CURRENT_USER\Software\Classes\exefile\Shell\open\command; if these are set by an attacker, the set command will be executed as a high-integrity process without a UAC prompt being displayed to the user. See 'resources' for which registry keys/values to set.
Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
Category: UAC Bypass
Privileges: User
MitreID: T1548.002
OperatingSystem: Windows 10, Windows 11
Full_Path:
- Path: C:\Windows\System32\fodhelper.exe
Detection:
- IOC: Event ID 10
- IOC: A binary or script spawned as a child process of fodhelper.exe
- IOC: Changes to HKEY_CURRENT_USER\Software\Classes\exefile\Shell\open\command
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/registry/registry_event/registry_event_shell_open_keys_manipulation.yml
Resources:
- Link: https://gist.github.com/havoc3-3/812547525107bd138a1a839118a3a44b
Acknowledgement:
- Person: Eron Clarke
25 changes: 25 additions & 0 deletions yml/OSBinaries/regedit_2.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
---
Name: regedit.exe
Description: regedit (Registry Editor) is a built-in Windows utility that allows users to view, edit, and manage the Windows Registry.
Author: Eron Clarke
Created: 2024-09-26
Commands:
- Command: regedit.exe
Description: Upon execution, regedit.exe checks two registry values at HKEY_CURRENT_USER\Software\Classes\exefile\Shell\open\command; if these are set by an attacker, the set command will be executed as a high-integrity process without a UAC prompt being displayed to the user. See 'resources' for which registry keys/values to set.
Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
Category: UAC Bypass
Privileges: User
MitreID: T1548.002
OperatingSystem: Windows 10, Windows 11
Full_Path:
- Path: C:\Windows\System32\regedit.exe
- Path: C:\Windows\SysWOW64\regedit.exe
Detection:
- IOC: Event ID 10
- IOC: A binary or script spawned as a child process of regedit.exe
- IOC: Changes to HKEY_CURRENT_USER\Software\Classes\exefile\Shell\open\command
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/registry/registry_event/registry_event_shell_open_keys_manipulation.yml
Resources:
- Link: https://gist.github.com/havoc3-3/812547525107bd138a1a839118a3a44b
Acknowledgement:
- Person: Eron Clarke
24 changes: 24 additions & 0 deletions yml/OSBinaries/slui.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
---
Name: slui.exe
Description: slui.exe (Software Licensing User Interface) is a system file in Windows responsible for managing the activation of the operating system.
Author: Eron Clarke
Created: 2024-09-26
Commands:
- Command: slui.exe
Description: Upon execution, slui.exe checks two registry values at HKEY_CURRENT_USER\Software\Classes\exefile\Shell\open\command; if these are set by an attacker, the set command will be executed as a high-integrity process without a UAC prompt being displayed to the user. See 'resources' for which registry keys/values to set.
Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
Category: UAC Bypass
Privileges: User
MitreID: T1548.002
OperatingSystem: Windows 10, Windows 11
Full_Path:
- Path: C:\Windows\System32\slui.exe
Detection:
- IOC: Event ID 10
- IOC: A binary or script spawned as a child process of slui.exe
- IOC: Changes to HKEY_CURRENT_USER\Software\Classes\exefile\Shell\open\command
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/registry/registry_event/registry_event_shell_open_keys_manipulation.yml
Resources:
- Link: https://gist.github.com/havoc3-3/812547525107bd138a1a839118a3a44b
Acknowledgement:
- Person: Eron Clarke
Loading