Common Information
Type Value
Value
Bypass User Account Control - T1548.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may bypass UAC mechanisms to elevate process privileges on system. Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation. The impact to the user ranges from denying the operation under high enforcement to allowing the user to perform the action if they are in the local administrators group and click through the prompt or allowing them to enter an administrator password to complete the action.(Citation: TechNet How UAC Works) If the UAC protection level of a computer is set to anything but the highest level, certain Windows programs can elevate privileges or execute some elevated [Component Object Model](https://attack.mitre.org/techniques/T1559/001) objects without prompting the user through the UAC notification box.(Citation: TechNet Inside UAC)(Citation: MSDN COM Elevation) An example of this is use of [Rundll32](https://attack.mitre.org/techniques/T1218/011) to load a specifically crafted DLL which loads an auto-elevated [Component Object Model](https://attack.mitre.org/techniques/T1559/001) object and performs a file operation in a protected directory which would typically require elevated access. Malicious software may also be injected into a trusted process to gain elevated privileges without prompting a user.(Citation: Davidson Windows) Many methods have been discovered to bypass UAC. The Github readme page for UACME contains an extensive list of methods(Citation: Github UACMe) that have been discovered and implemented, but may not be a comprehensive list of bypasses. Additional bypass methods are regularly discovered and some used in the wild, such as: * <code>eventvwr.exe</code> can auto-elevate and execute a specified binary or script.(Citation: enigma0x3 Fileless UAC Bypass)(Citation: Fortinet Fareit) Another bypass is possible through some lateral movement techniques if credentials for an account with administrator privileges are known, since UAC is a single system security mechanism, and the privilege or integrity of a process running on one system will be unknown on remote systems and default to high integrity.(Citation: SANS UAC Bypass)
Details Published Attributes CTI Title
Details Website 2022-04-08 0 Researchers Connect BlackCat Ransomware with Past BlackMatter Malware Activity
Details Website 2022-03-19 86 LockBit Ransomware v2.0
Details Website 2022-03-03 14 Cyberattacks are Prominent in the Russia-Ukraine Conflict
Details Website 2022-03-03 14 Cyberattacks are Prominent in the Russia-Ukraine Conflict
Details Website 2022-02-24 123 Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks | CISA
Details Website 2022-02-14 51 PrivateLoader: The first step in many malware schemes
Details Website 2022-02-14 16 NFT Lure Used to Distribute BitRAT | FortiGuard Labs
Details Website 2022-01-19 85 One Source to Rule Them All: Chasing AVADDON Ransomware | Mandiant
Details Website 2022-01-01 30 Threat Report
Details Website 2021-12-16 36 Threat Thursday: Warzone RAT Breeds a Litter of ScriptKiddies
Details Website 2021-10-18 286 Is There Really Such a Thing as a Low-Paid Ransomware Operator?
Details Website 2021-08-18 78 BlackMatter Ransomware Specifications Shared on Cybercrime Forum | Threat Intelligence | CloudSEK
Details Website 2021-06-10 117 BackdoorDiplomacy: Upgrading from Quarian to Turian | WeLiveSecurity
Details Website 2021-05-18 11 ProblemChild: Detecting living-off-the-land attacks using the Elastic Stack
Details Website 2021-05-14 58 DarkSide Ransomware Victims Sold Short | McAfee Blog
Details Website 2021-04-01 60 Avaddon RaaS | Breaks Public Decryptor, Continues On Rampage - SentinelLabs
Details Website 2021-01-12 70 Operation Spalax: Targeted malware attacks in Colombia | WeLiveSecurity
Details Website 2020-12-21 7 DarkSide Ransomware Behavior and Techniques | Keysight Blogs
Details Website 2020-12-14 220 Carbanak/ FIN7 Crime Gang Threat Intel Advisory | Threat Intelligence | CloudSEK
Details Website 2020-10-27 49 North Korean Advanced Persistent Threat Focus: Kimsuky | CISA
Details Website 2020-06-18 76 Digging up InvisiMole’s hidden arsenal | WeLiveSecurity
Details Website 2020-05-21 108 No “Game over” for the Winnti Group | WeLiveSecurity
Details Website 2020-05-13 66 Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks | WeLiveSecurity
Details Website 2020-02-13 16 Spora - the Shortcut Worm that is also a Ransomware
Details Website 2019-12-20 18 A Shortcut to Compromise: Cobalt Gang phishing campaign