UAC Bypass Using Windows Media Player - Registry
Detects the pattern of UAC Bypass using Windows Media Player osksupport.dll (UACMe 32)
Sigma rule (View on GitHub)
1title: UAC Bypass Using Windows Media Player - Registry
2id: 5f9db380-ea57-4d1e-beab-8a2d33397e93
3status: test
4description: Detects the pattern of UAC Bypass using Windows Media Player osksupport.dll (UACMe 32)
5references:
6 - https://github.com/hfiref0x/UACME
7author: Christian Burkard (Nextron Systems)
8date: 2021-08-23
9modified: 2023-08-17
10tags:
11 - attack.defense-evasion
12 - attack.privilege-escalation
13 - attack.t1548.002
14logsource:
15 category: registry_set
16 product: windows
17detection:
18 selection:
19 TargetObject|endswith: '\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store\C:\Program Files\Windows Media Player\osk.exe'
20 Details: 'Binary Data'
21 condition: selection
22falsepositives:
23 - Unknown
24level: high
References
Related rules
- Bypass UAC Using DelegateExecute
- Bypass UAC Using SilentCleanup Task
- Bypass UAC via CMSTP
- Bypass UAC via WSReset.exe
- Function Call From Undocumented COM Interface EditionUpgradeManager