diff --git a/atomics/T1548.002/T1548.002.yaml b/atomics/T1548.002/T1548.002.yaml index 77382dc5..23eb27a7 100644 --- a/atomics/T1548.002/T1548.002.yaml +++ b/atomics/T1548.002/T1548.002.yaml @@ -557,6 +557,7 @@ atomic_tests: powershell Stop-Process -Name mmc -Force -ErrorAction Ignore name: command_prompt - name: WinPwn - UAC Magic + auto_generated_guid: 964d8bf8-37bc-4fd3-ba36-ad13761ebbcc description: UAC bypass using Magic technique via function of WinPwn supported_platforms: - windows @@ -567,6 +568,7 @@ atomic_tests: UACBypass -noninteractive -command "C:\windows\system32\cmd.exe" -technique magic name: powershell - name: WinPwn - UAC Bypass ccmstp technique + auto_generated_guid: f3c145f9-3c8d-422c-bd99-296a17a8f567 description: UAC bypass using ccmstp technique via function of WinPwn supported_platforms: - windows @@ -577,6 +579,7 @@ atomic_tests: UACBypass -noninteractive -command "C:\windows\system32\calc.exe" -technique ccmstp name: powershell - name: WinPwn - UAC Bypass DiskCleanup technique + auto_generated_guid: 1ed67900-66cd-4b09-b546-2a0ef4431a0c description: UAC bypass using DiskCleanup technique via function of WinPwn supported_platforms: - windows @@ -587,6 +590,7 @@ atomic_tests: UACBypass -noninteractive -command "C:\windows\system32\cmd.exe" -technique DiskCleanup name: powershell - name: WinPwn - UAC Bypass DccwBypassUAC technique + auto_generated_guid: 2b61977b-ae2d-4ae4-89cb-5c36c89586be description: UAC Bypass DccwBypassUAC technique via function of WinPwn supported_platforms: - windows diff --git a/atomics/used_guids.txt b/atomics/used_guids.txt index 9f1d5489..fe9ac172 100644 --- a/atomics/used_guids.txt +++ b/atomics/used_guids.txt @@ -1021,3 +1021,7 @@ c67ba807-f48b-446e-b955-e4928cd1bf91 f8da74bb-21b8-4af9-8d84-f2c8e4a220e3 cb6e76ca-861e-4a7f-be08-564caa3e6f75 ce483c35-c74b-45a7-a670-631d1e69db3d +964d8bf8-37bc-4fd3-ba36-ad13761ebbcc +f3c145f9-3c8d-422c-bd99-296a17a8f567 +1ed67900-66cd-4b09-b546-2a0ef4431a0c +2b61977b-ae2d-4ae4-89cb-5c36c89586be