UAC Bypass Via Wsreset
Unfixed method for UAC bypass from Windows 10. WSReset.exe file associated with the Windows Store. It will run a binary file contained in a low-privilege registry.
Sigma rule (View on GitHub)
1title: UAC Bypass Via Wsreset
2id: 6ea3bf32-9680-422d-9f50-e90716b12a66
3status: test
4description: Unfixed method for UAC bypass from Windows 10. WSReset.exe file associated with the Windows Store. It will run a binary file contained in a low-privilege registry.
5references:
6 - https://www.bleepingcomputer.com/news/security/trickbot-uses-a-new-windows-10-uac-bypass-to-launch-quietly
7 - https://lolbas-project.github.io/lolbas/Binaries/Wsreset
8author: oscd.community, Dmitry Uchakin
9date: 2020-10-07
10modified: 2021-11-27
11tags:
12 - attack.defense-evasion
13 - attack.privilege-escalation
14 - attack.t1548.002
15logsource:
16 category: registry_event
17 product: windows
18detection:
19 selection:
20 TargetObject|endswith: '\AppX82a6gwre4fdg3bt635tn5ctqjf8msdd2\Shell\open\command'
21 condition: selection
22fields:
23 - ComputerName
24 - Image
25 - EventType
26 - TargetObject
27falsepositives:
28 - Unknown
29level: high
References
Related rules
- Bypass UAC Using DelegateExecute
- Bypass UAC Using SilentCleanup Task
- Bypass UAC via CMSTP
- Bypass UAC via WSReset.exe
- CMSTP UAC Bypass via COM Object Access