2019-01-31 15:28:40 +00:00
[![Build status ](https://ci.appveyor.com/api/projects/status/dvnyciarevyj3vuj?svg=true )](https://ci.appveyor.com/project/hfiref0x/uacme)
2015-03-28 12:00:29 +00:00
# UACMe
* Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor.
# System Requirements
2018-02-09 07:12:27 +00:00
* x86-32/x64 Windows 7/8/8.1/10 (client, some methods however works on server version too).
2015-03-28 12:00:29 +00:00
* Admin account with UAC set on default settings required.
# Usage
2015-09-17 07:31:36 +00:00
Run executable from command line: akagi32 [Key] [Param] or akagi64 [Key] [Param]. See "Run examples" below for more info.
2020-10-19 03:56:29 +00:00
First parameter is number of method to use, second is optional command (executable file name including full path) to run. Second parameter can be empty - in this case program will execute elevated cmd.exe from system32 folder.
2015-09-17 07:31:36 +00:00
2020-10-05 17:17:21 +00:00
**Note**: Since 3.5.0 version all "fixed" methods are considered obsolete and removed altogether with all supporting code/units. If you still need them - use [v3.2.x branch ](https://github.com/hfiref0x/UACME/tree/v3.2.x )
< details >
< summary > Keys (click to expand/collapse)< / summary >
2017-02-13 16:32:26 +00:00
1. Author: Leo Davidson
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\sysprep\sysprep.exe
2017-02-13 16:32:26 +00:00
* Component(s): cryptbase.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmStandardAutoElevation
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 8.1 (9600)
* How: sysprep.exe hardened LoadFrom manifest elements
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
2. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\sysprep\sysprep.exe
2017-02-13 16:32:26 +00:00
* Component(s): ShCore.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmStandardAutoElevation
2017-02-13 16:32:26 +00:00
* Works from: Windows 8.1 (9600)
* Fixed in: Windows 10 TP (> 9600)
* How: Side effect of ShCore.dll moving to \KnownDlls
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
3. Author: Leo Davidson derivative by WinNT/Pitou
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\oobe\setupsqm.exe
2017-02-13 16:32:26 +00:00
* Component(s): WdsCore.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmStandardAutoElevation
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
2017-03-26 03:48:36 +00:00
* Fixed in: Windows 10 TH2 (10558)
2019-05-27 04:38:06 +00:00
* How: Side effect of OOBE redesign
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
4. Author: Jon Ericson, WinNT/Gootkit, mzH
* Type: AppCompat
* Method: RedirectEXE Shim
2017-02-17 17:56:13 +00:00
* Target(s): \system32\cliconfg.exe
2017-02-13 16:32:26 +00:00
* Component(s): -
2018-02-09 07:12:27 +00:00
* Implementation: ucmShimRedirectEXE
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TP (> 9600)
2017-07-13 13:12:55 +00:00
* How: Sdbinst.exe autoelevation removed, KB3045645/KB3048097 for rest Windows versions
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
5. Author: WinNT/Simda
* Type: Elevated COM interface
* Method: ISecurityEditor
* Target(s): HKLM registry keys
* Component(s): -
2018-02-22 05:31:35 +00:00
* Implementation: ucmSimdaTurnOffUac
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH1 (10147)
* How: ISecurityEditor interface method changed
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
6. Author: Win32/Carberp
* Type: Dll Hijack
* Method: WUSA
2017-02-17 17:56:13 +00:00
* Target(s): \ehome\mcx2prov.exe, \system32\migwiz\migwiz.exe
2017-02-13 16:32:26 +00:00
* Component(s): WdsCore.dll, CryptBase.dll, CryptSP.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmWusaMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH1 (10147)
* How: WUSA /extract option removed
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
7. Author: Win32/Carberp derivative
* Type: Dll Hijack
* Method: WUSA
2017-02-17 17:56:13 +00:00
* Target(s): \system32\cliconfg.exe
2017-02-13 16:32:26 +00:00
* Component(s): ntwdblib.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmWusaMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH1 (10147)
* How: WUSA /extract option removed
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
8. Author: Leo Davidson derivative by Win32/Tilon
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\sysprep\sysprep.exe
2017-02-13 16:32:26 +00:00
* Component(s): Actionqueue.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmStandardAutoElevation
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 8.1 (9600)
* How: sysprep.exe hardened LoadFrom manifest
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
9. Author: Leo Davidson, WinNT/Simda, Win32/Carberp derivative
* Type: Dll Hijack
* Method: IFileOperation, ISecurityEditor, WUSA
2017-02-17 17:56:13 +00:00
* Target(s): IFEO registry keys, \system32\cliconfg.exe
2017-02-13 16:32:26 +00:00
* Component(s): Attacker defined Application Verifier Dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmAvrfMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH1 (10147)
* How: WUSA /extract option removed, ISecurityEditor interface method changed
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
10. Author: WinNT/Pitou, Win32/Carberp derivative
* Type: Dll Hijack
* Method: IFileOperation, WUSA
2017-02-17 17:56:13 +00:00
* Target(s): \system32\\{New}or{Existing}\\{autoelevated}.exe, e.g. winsat.exe
2017-02-13 16:32:26 +00:00
* Component(s): Attacker defined dll, e.g. PowProf.dll, DevObj.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmWinSATMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH2 (10548)
2017-02-17 17:56:13 +00:00
* How: AppInfo elevated application path control hardening
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
11. Author: Jon Ericson, WinNT/Gootkit, mzH
2017-02-13 16:35:18 +00:00
* Type: AppCompat
2017-02-13 16:32:26 +00:00
* Method: Shim Memory Patch
2017-02-17 17:56:13 +00:00
* Target(s): \system32\iscsicli.exe
2017-02-13 16:32:26 +00:00
* Component(s): Attacker prepared shellcode
2018-02-09 07:12:27 +00:00
* Implementation: ucmShimPatch
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 8.1 (9600)
2017-07-13 13:12:55 +00:00
* How: Sdbinst.exe autoelevation removed, KB3045645/KB3048097 for rest Windows versions
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
12. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\sysprep\sysprep.exe
2017-02-13 16:32:26 +00:00
* Component(s): dbgcore.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmStandardAutoElevation
2017-02-13 16:32:26 +00:00
* Works from: Windows 10 TH1 (10240)
* Fixed in: Windows 10 TH2 (10565)
* How: sysprep.exe manifest updated
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
13. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\mmc.exe EventVwr.msc
2017-02-13 16:32:26 +00:00
* Component(s): elsext.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmMMCMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS1 (14316)
* How: Missing dependency removed
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
14. Author: Leo Davidson, WinNT/Sirefef derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system\credwiz.exe, \system32\wbem\oobe.exe
2017-02-13 16:32:26 +00:00
* Component(s): netutils.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmSirefefMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH2 (10548)
2017-02-17 17:56:13 +00:00
* How: AppInfo elevated application path control hardening
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
15. Author: Leo Davidson, Win32/Addrop, Metasploit derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\cliconfg.exe
2017-02-13 16:32:26 +00:00
* Component(s): ntwdblib.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmGenericAutoelevation
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS1 (14316)
* How: Cliconfg.exe autoelevation removed
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
16. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\GWX\GWXUXWorker.exe, \system32\inetsrv\inetmgr.exe
2017-02-13 16:32:26 +00:00
* Component(s): SLC.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmGWX
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS1 (14316)
* How: AppInfo elevated application path control and inetmgr executable hardening
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
17. Author: Leo Davidson derivative
* Type: Dll Hijack (Import forwarding)
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\sysprep\sysprep.exe
2017-02-13 16:32:26 +00:00
* Component(s): unbcl.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmStandardAutoElevation2
2017-03-25 12:39:31 +00:00
* Works from: Windows 8.1 (9600)
2017-02-13 16:32:26 +00:00
* Fixed in: Windows 10 RS1 (14371)
* How: sysprep.exe manifest updated
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
18. Author: Leo Davidson derivative
* Type: Dll Hijack (Manifest)
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\taskhost.exe, \system32\tzsync.exe (any ms exe without manifest)
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
* Implementation: ucmAutoElevateManifest
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS1 (14371)
* How: Manifest parsing logic reviewed
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
19. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\inetsrv\inetmgr.exe
2017-02-13 16:32:26 +00:00
* Component(s): MsCoree.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmInetMgrMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS1 (14376)
2017-05-02 06:47:46 +00:00
* How: inetmgr.exe executable manifest hardening, MitigationPolicy->ProcessImageLoadPolicy->PreferSystem32Images
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
20. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\mmc.exe, Rsop.msc
2017-02-13 16:32:26 +00:00
* Component(s): WbemComn.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmMMCMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
2017-06-30 05:59:47 +00:00
* Fixed in: Windows 10 RS3 (16232)
* How: Target requires wbemcomn.dll to be signed by MS
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
21. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation, SxS DotLocal
2017-02-17 17:56:13 +00:00
* Target(s): \system32\sysprep\sysprep.exe
2017-02-13 16:32:26 +00:00
* Component(s): comctl32.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmSXSMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
2017-06-30 05:59:47 +00:00
* Fixed in: Windows 10 RS3 (16232)
2019-05-22 13:10:25 +00:00
* How: MitigationPolicy->ProcessImageLoadPolicy->PreferSystem32Images
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
22. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation, SxS DotLocal
2017-02-17 17:56:13 +00:00
* Target(s): \system32\consent.exe
2017-02-13 16:32:26 +00:00
* Component(s): comctl32.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmSXSMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v2.5.0
2017-02-13 16:32:26 +00:00
23. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\pkgmgr.exe
2017-02-13 16:32:26 +00:00
* Component(s): DismCore.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmDismMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v2.5.1
2017-02-13 16:32:26 +00:00
24. Author: BreakingMalware
* Type: Shell API
* Method: Environment variables expansion
2017-02-17 17:56:13 +00:00
* Target(s): \system32\CompMgmtLauncher.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
* Implementation: ucmCometMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS2 (15031)
* How: CompMgmtLauncher.exe autoelevation removed
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
25. Author: Enigma0x3
* Type: Shell API
* Method: Registry key manipulation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\EventVwr.exe, \system32\CompMgmtLauncher.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
* Implementation: ucmHijackShellCommandMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS2 (15031)
* How: EventVwr.exe redesigned, CompMgmtLauncher.exe autoelevation removed
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
26. Author: Enigma0x3
* Type: Race Condition
* Method: File overwrite
2017-02-17 17:56:13 +00:00
* Target(s): %temp%\GUID\dismhost.exe
2017-02-13 16:32:26 +00:00
* Component(s): LogProvider.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmDiskCleanupRaceCondition
2017-02-13 16:32:26 +00:00
* Works from: Windows 10 TH1 (10240)
2017-05-26 10:11:33 +00:00
* AlwaysNotify compatible
2017-02-13 16:32:26 +00:00
* Fixed in: Windows 10 RS2 (15031)
* How: File security permissions altered
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-02-13 16:32:26 +00:00
27. Author: ExpLife
* Type: Elevated COM interface
* Method: IARPUninstallStringLauncher
2018-02-09 07:12:27 +00:00
* Target(s): Attacker defined
* Component(s): Attacker defined
* Implementation: ucmUninstallLauncherMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
2017-05-26 09:23:18 +00:00
* Fixed in: Windows 10 RS3 (16199)
* How: UninstallStringLauncher interface removed from COMAutoApprovalList
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-03-13 04:21:30 +00:00
28. Author: Exploit/Sandworm
* Type: Whitelisted component
* Method: InfDefaultInstall
2018-02-09 07:12:27 +00:00
* Target(s): Attacker defined
* Component(s): Attacker defined
* Implementation: ucmSandwormMethod
2017-03-13 04:21:30 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 8.1 (9600)
* How: InfDefaultInstall.exe removed from g_lpAutoApproveEXEList (MS14-060)
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-03-15 06:44:03 +00:00
29. Author: Enigma0x3
* Type: Shell API
* Method: Registry key manipulation
2019-02-24 13:10:23 +00:00
* Target(s): \system32\sdclt.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
* Implementation: ucmAppPathMethod
2017-06-22 07:17:35 +00:00
* Works from: Windows 10 TH1 (10240)
* Fixed in: Windows 10 RS3 (16215)
* How: Shell API update
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-03-25 12:39:31 +00:00
30. Author: Leo Davidson derivative, lhc645
* Type: Dll Hijack
* Method: WOW64 logger
2017-03-25 12:42:21 +00:00
* Target(s): \syswow64\\{any elevated exe, e.g wusa.exe}
2017-03-25 12:39:31 +00:00
* Component(s): wow64log.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmWow64LoggerMethod
2017-03-25 12:39:31 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v2.7.0
2017-03-25 12:39:31 +00:00
31. Author: Enigma0x3
* Type: Shell API
* Method: Registry key manipulation
2019-02-24 13:10:23 +00:00
* Target(s): \system32\sdclt.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
* Implementation: ucmSdcltIsolatedCommandMethod
2017-06-22 07:17:35 +00:00
* Works from: Windows 10 TH1 (10240)
2017-10-30 03:30:38 +00:00
* Fixed in: Windows 10 RS4 (17025)
* How: Shell API / Windows components update
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-05-09 03:39:44 +00:00
32. Author: xi-tauw
* Type: Dll Hijack
* Method: UIPI bypass with uiAccess application
* Target(s): \Program Files\Windows Media Player\osk.exe, \system32\EventVwr.exe, \system32\mmc.exe
* Component(s): duser.dll, osksupport.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmUiAccessMethod
2017-05-09 03:39:44 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v2.7.1
2017-05-26 09:23:18 +00:00
33. Author: winscripting.blog
* Type: Shell API
* Method: Registry key manipulation
2020-05-23 11:55:26 +00:00
* Target(s): \system32\fodhelper.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
2020-10-05 17:17:21 +00:00
* Implementation: ucmShellRegModMethod
2017-06-22 07:17:35 +00:00
* Works from: Windows 10 TH1 (10240)
2017-05-26 09:23:18 +00:00
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v2.7.2
2017-05-26 09:23:18 +00:00
34. Author: James Forshaw
* Type: Shell API
* Method: Environment variables expansion
* Target(s): \system32\svchost.exe via \system32\schtasks.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
* Implementation: ucmDiskCleanupEnvironmentVariable
2017-05-26 10:11:33 +00:00
* Works from: Windows 8.1 (9600)
* AlwaysNotify compatible
2017-05-26 09:23:18 +00:00
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v2.7.2
2017-05-27 11:01:47 +00:00
35. Author: CIA & James Forshaw
* Type: Impersonation
* Method: Token Manipulations
* Target(s): Autoelevated applications
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
* Implementation: ucmTokenModification
2017-05-27 11:01:47 +00:00
* Works from: Windows 7 (7600)
* AlwaysNotify compatible, see note
2018-06-12 18:33:49 +00:00
* Fixed in: Windows 10 RS5 (17686)
* How: ntoskrnl.exe->SeTokenCanImpersonate additional access token check added
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2019-01-25 06:42:24 +00:00
36. Author: Thomas Vanhoutte aka SandboxEscaper
2017-06-22 07:17:35 +00:00
* Type: Race condition
* Method: NTFS reparse point & Dll Hijack
* Target(s): wusa.exe
2019-10-23 06:42:56 +00:00
* Component(s): Attacker defined
2018-02-09 07:12:27 +00:00
* Implementation: ucmJunctionMethod
2017-06-22 07:17:35 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v2.7.4
2017-06-30 05:59:47 +00:00
37. Author: Ernesto Fernandez, Thomas Vanhoutte
* Type: Dll Hijack
2017-07-13 13:12:55 +00:00
* Method: SxS DotLocal, NTFS reparse point
2017-06-30 05:59:47 +00:00
* Target(s): \system32\dccw.exe
* Component(s): GdiPlus.dll
2018-07-14 17:15:02 +00:00
* Implementation: ucmSXSDccwMethod
2017-06-30 05:59:47 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v2.7.5
2017-07-13 13:12:55 +00:00
38. Author: Clement Rouault
* Type: Whitelisted component
* Method: APPINFO command line spoofing
* Target(s): \system32\mmc.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
2018-07-14 17:15:02 +00:00
* Implementation: ucmHakrilMethod
2017-07-13 13:12:55 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v2.7.6
2017-07-21 10:31:38 +00:00
39. Author: Stefan Kanthak
* Type: Dll Hijack
* Method: .NET Code Profiler
* Target(s): \system32\mmc.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
2018-07-14 17:15:02 +00:00
* Implementation: ucmCorProfilerMethod
2017-07-21 10:31:38 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v2.7.7
2017-07-30 07:01:34 +00:00
40. Author: Ruben Boonen
2018-05-25 08:27:20 +00:00
* Type: COM Handler Hijack
2017-07-30 07:01:34 +00:00
* Method: Registry key manipulation
2020-05-05 06:16:44 +00:00
* Target(s): \system32\mmc.exe, \system32\recdisc.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
2018-05-25 08:27:20 +00:00
* Implementation: ucmCOMHandlersMethod
2017-07-30 07:01:34 +00:00
* Works from: Windows 7 (7600)
2019-05-22 13:10:25 +00:00
* Fixed in: Windows 10 19H1 (18362)
2019-05-27 04:38:06 +00:00
* How: Side effect of Windows changes
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-08-16 04:57:52 +00:00
41. Author: Oddvar Moe
* Type: Elevated COM interface
* Method: ICMLuaUtil
* Target(s): Attacker defined
* Component(s): Attacker defined
2018-02-09 07:12:27 +00:00
* Implementation: ucmCMLuaUtilShellExecMethod
2017-08-16 04:57:52 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v2.7.9
2017-11-08 05:42:05 +00:00
42. Author: BreakingMalware and Enigma0x3
* Type: Elevated COM interface
* Method: IFwCplLua
* Target(s): Attacker defined
* Component(s): Attacker defined
2018-02-09 07:12:27 +00:00
* Implementation: ucmFwCplLuaMethod
2017-11-08 05:42:05 +00:00
* Works from: Windows 7 (7600)
2018-09-30 05:51:47 +00:00
* Fixed in: Windows 10 RS4 (17134)
* How: Shell API update
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2017-11-10 06:31:20 +00:00
43. Author: Oddvar Moe derivative
* Type: Elevated COM interface
* Method: IColorDataProxy, ICMLuaUtil
* Target(s): Attacker defined
* Component(s): Attacker defined
2018-02-09 07:12:27 +00:00
* Implementation: ucmDccwCOMMethod
2017-11-10 06:31:20 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v2.8.3
2017-11-22 09:54:51 +00:00
44. Author: bytecode77
* Type: Shell API
* Method: Environment variables expansion
2017-11-23 16:14:08 +00:00
* Target(s): Multiple auto-elevated processes
2017-11-22 09:54:51 +00:00
* Component(s): Various per target
2018-07-14 17:15:02 +00:00
* Implementation: ucmVolatileEnvMethod
2017-11-22 09:54:51 +00:00
* Works from: Windows 7 (7600)
2017-11-23 16:14:08 +00:00
* Fixed in: Windows 10 RS3 (16299)
2017-11-22 09:54:51 +00:00
* How: Current user system directory variables ignored during process creation
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2018-01-15 10:53:43 +00:00
45. Author: bytecode77
* Type: Shell API
* Method: Registry key manipulation
* Target(s): \system32\slui.exe
* Component(s): Attacker defined
2018-07-14 17:15:02 +00:00
* Implementation: ucmSluiHijackMethod
2018-01-15 10:53:43 +00:00
* Works from: Windows 8.1 (9600)
2020-10-05 17:17:21 +00:00
* Fixed in: Windows 10 20H1 (19041)
* How: Side effect of Windows changes
* Code status: removed starting from v3.5.0 :tractor:
2018-01-19 10:41:27 +00:00
46. Author: Anonymous
* Type: Race Condition
* Method: Registry key manipulation
* Target(s): \system32\BitlockerWizardElev.exe
* Component(s): Attacker defined
2018-02-09 07:12:27 +00:00
* Implementation: ucmBitlockerRCMethod
2018-01-19 10:41:27 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS4 (>16299)
* How: Shell API update
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2018-05-25 08:27:20 +00:00
47. Author: clavoillotte & 3gstudent
* Type: COM Handler Hijack
* Method: Registry key manipulation
* Target(s): \system32\mmc.exe
* Component(s): Attacker defined
* Implementation: ucmCOMHandlersMethod2
* Works from: Windows 7 (7600)
2019-05-22 13:10:25 +00:00
* Fixed in: Windows 10 19H1 (18362)
2019-05-27 04:38:06 +00:00
* How: Side effect of Windows changes
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2018-06-15 11:44:01 +00:00
48. Author: deroko
* Type: Elevated COM interface
* Method: ISPPLUAObject
* Target(s): Attacker defined
* Component(s): Attacker defined
* Implementation: ucmSPPLUAObjectMethod
* Works from: Windows 7 (7600)
2018-09-30 05:51:47 +00:00
* Fixed in: Windows 10 RS5 (17763)
* How: ISPPLUAObject interface method changed
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2018-09-02 07:28:59 +00:00
49. Author: RinN
* Type: Elevated COM interface
* Method: ICreateNewLink
* Target(s): \system32\TpmInit.exe
* Component(s): WbemComn.dll
* Implementation: ucmCreateNewLinkMethod
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS1 (14393)
* How: Side effect of consent.exe COMAutoApprovalList introduction
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2018-09-02 07:28:59 +00:00
50. Author: Anonymous
* Type: Elevated COM interface
* Method: IDateTimeStateWrite, ISPPLUAObject
* Target(s): w32time service
* Component(s): w32time.dll
* Implementation: ucmDateTimeStateWriterMethod
* Works from: Windows 7 (7600)
2018-09-30 05:51:47 +00:00
* Fixed in: Windows 10 RS5 (17763)
* How: Side effect of ISPPLUAObject interface change
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2018-09-02 07:28:59 +00:00
51. Author: bytecode77 derivative
* Type: Elevated COM interface
* Method: IAccessibilityCplAdmin
* Target(s): \system32\rstrui.exe
* Component(s): Attacker defined
* Implementation: ucmAcCplAdminMethod
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS4 (17134)
* How: Shell API update
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2018-11-10 09:42:19 +00:00
52. Author: David Wells
* Type: Whitelisted component
* Method: AipNormalizePath parsing abuse
* Target(s): Attacker defined
* Component(s): Attacker defined
* Implementation: ucmDirectoryMockMethod
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v3.0.4
2019-01-25 06:42:24 +00:00
53. Author: Emeric Nasi
* Type: Shell API
* Method: Registry key manipulation
* Target(s): \system32\sdclt.exe
* Component(s): Attacker defined
2020-10-05 17:17:21 +00:00
* Implementation: ucmShellRegModMethod
2019-01-25 06:42:24 +00:00
* Works from: Windows 10 (14393)
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v3.1.3
2019-01-25 06:42:24 +00:00
54. Author: egre55
* Type: Dll Hijack
* Method: Dll path search abuse
* Target(s): \syswow64\SystemPropertiesAdvanced.exe and other SystemProperties*.exe
* Component(s): \AppData\Local\Microsoft\WindowsApps\srrstr.dll
* Implementation: ucmEgre55Method
* Works from: Windows 10 (14393)
2019-09-02 08:45:49 +00:00
* Fixed in: Windows 10 19H1 (18362)
* How: SysDm.cpl!_CreateSystemRestorePage has been updated for secured load library call
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2019-02-17 05:01:05 +00:00
55. Author: James Forshaw
* Type: GUI Hack
* Method: UIPI bypass with token modification
* Target(s): \system32\osk.exe, \system32\msconfig.exe
* Component(s): Attacker defined
* Implementation: ucmTokenModUIAccessMethod
* Works from: Windows 7 (7600)
2019-03-16 07:22:48 +00:00
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v3.1.5
2019-03-16 07:22:48 +00:00
56. Author: Hashim Jawad
* Type: Shell API
* Method: Registry key manipulation
* Target(s): \system32\WSReset.exe
* Component(s): Attacker defined
2020-10-05 17:17:21 +00:00
* Implementation: ucmShellRegModMethod
2019-03-16 07:22:48 +00:00
* Works from: Windows 10 (17134)
2019-01-25 06:42:24 +00:00
* Fixed in: unfixed :see_no_evil:
2019-03-29 18:06:01 +00:00
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v3.1.7
2019-03-29 18:06:01 +00:00
57. Author: Leo Davidson derivative by Win32/Gapz
* Type: Dll Hijack
* Method: IFileOperation
* Target(s): \system32\sysprep\sysprep.exe
* Component(s): unattend.dll
* Implementation: ucmStandardAutoElevation
2019-03-31 07:29:55 +00:00
* Works from: Windows 7 (7600)
2019-03-29 18:06:01 +00:00
* Fixed in: Windows 8.1 (9600)
2019-10-24 04:33:03 +00:00
* How: sysprep.exe hardened LoadFrom manifest elements
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2019-10-24 04:33:03 +00:00
58. Author: RinN
* Type: Elevated COM interface
* Method: IEditionUpgradeManager
* Target(s): \system32\clipup.exe
* Component(s): Attacker defined
* Implementation: ucmEditionUpgradeManagerMethod
* Works from: Windows 10 (14393)
2019-12-18 18:01:17 +00:00
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v3.2.0
2019-12-18 18:01:17 +00:00
59. Author: James Forshaw
* Type: AppInfo ALPC
* Method: RAiLaunchAdminProcess and DebugObject
* Target(s): Attacker defined
* Component(s): Attacker defined
* Implementation: ucmDebugObjectMethod
* Works from: Windows 7 (7600)
2019-10-24 04:33:03 +00:00
* Fixed in: unfixed :see_no_evil:
2020-04-24 04:15:50 +00:00
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v3.2.3
2020-04-24 04:15:50 +00:00
60. Author: Enigma0x3 derivative by WinNT/Glupteba
* Type: Shell API
* Method: Registry key manipulation
* Target(s): \system32\CompMgmtLauncher.exe
* Component(s): Attacker defined
* Implementation: ucmGluptebaMethod
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS2 (15063)
2020-05-05 06:16:44 +00:00
* How: CompMgmtLauncher.exe autoelevation removed
2020-10-05 17:17:21 +00:00
* Code status: removed starting from v3.5.0 :tractor:
2020-05-05 06:16:44 +00:00
61. Author: Enigma0x3/bytecode77 derivative by Nassim Asrir
* Type: Shell API
* Method: Registry key manipulation
* Target(s): \system32\slui.exe, \system32\changepk.exe
* Component(s): Attacker defined
2020-10-05 17:17:21 +00:00
* Implementation: ucmShellRegModMethod
2020-05-05 06:16:44 +00:00
* Works from: Windows 10 (14393)
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v3.2.5
2020-05-23 11:55:26 +00:00
62. Author: winscripting.blog
* Type: Shell API
* Method: Registry key manipulation
* Target(s): \system32\computerdefaults.exe
* Component(s): Attacker defined
2020-10-05 17:17:21 +00:00
* Implementation: ucmShellRegModMethod
2020-05-23 11:55:26 +00:00
* Works from: Windows 10 RS4 (17134)
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v3.2.6
2020-09-14 08:47:52 +00:00
63. Author: Arush Agarampur
* Type: Dll Hijack
* Method: ISecurityEditor
* Target(s): Native Image Cache elements
* Component(s): Attacker defined
* Implementation: ucmNICPoisonMethod
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2020-10-05 17:17:21 +00:00
* Code status: added in v3.2.7
2020-10-19 03:56:29 +00:00
64. Author: Arush Agarampur
* Type: Elevated COM interface
* Method: IIEAxiAdminInstaller, IIEAxiInstaller2, IFileOperation
* Target(s): IE add-on install cache
* Component(s): Attacker defined
* Implementation: ucmIeAddOnInstallMethod
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
* Code status: added in v3.5.1
2020-11-02 17:09:36 +00:00
65. Author: Arush Agarampur
* Type: Elevated COM interface
* Method: IWscAdmin
* Target(s): Shell protocol registry entry
* Component(s): Attacker defined
* Implementation: ucmWscActionProtocolMethod
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
* Code status: added in v3.5.2
2020-11-12 23:50:49 +00:00
66. Author: Arush Agarampur
* Type: Elevated COM interface
* Method: IFwCplLua
* Target(s): Shell protocol registry entry and environment variables
* Component(s): Attacker defined
* Implementation: ucmFwCplLuaMethod2
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
* Code status: added in v3.5.3
2020-12-27 08:23:36 +00:00
67. Author: Arush Agarampur
* Type: Shell API
* Method: Registry key manipulation
* Target(s): \system32\fodhelper.exe
* Component(s): Attacker defined
* Implementation: ucmMsSettignsProtocolMethod
* Works from: Windows 10 TH1 (10240)
* Fixed in: unfixed :see_no_evil:
* How: -
* Code status: added in v3.5.4
2020-10-05 17:17:21 +00:00
< / details >
2017-02-12 14:06:14 +00:00
2015-03-28 12:00:29 +00:00
Note:
2020-11-02 17:09:36 +00:00
* Method (30) (63) (64) (65) implemented only in x64 version;
2017-05-27 11:01:47 +00:00
* Method (30) require x64 because it abuses WOW64 subsystem feature;
2019-02-17 05:01:05 +00:00
* Method (55) is not really reliable (as any GUI hacks) and included just for fun.
2015-03-28 12:00:29 +00:00
Run examples:
2020-10-05 17:17:21 +00:00
* akagi32.exe 23
* akagi64.exe 61
* akagi32 23 c:\windows\system32\calc.exe
* akagi64 61 c:\windows\system32\charmap.exe
2015-03-28 12:00:29 +00:00
# Warning
2020-10-19 03:56:29 +00:00
* This tool shows ONLY popular UAC bypass method used by malware, and re-implement some of them in a different way improving original concepts. There are different, not yet known to the general public, methods. Be aware of this;
2019-06-25 10:09:34 +00:00
* This tool is not intended for AV tests and not tested to work in aggressive AV environment, if you still plan to use it with installed bloatware AV soft - use it at your own risk;
2016-05-12 03:21:26 +00:00
* Some AV may flag this tool as HackTool, MSE/WinDefender constantly marks it as malware, nope;
2016-07-05 08:28:44 +00:00
* If you run this program on real computer remember to remove all program leftovers after usage, for more info about files it drops to system folders see source code;
2017-02-13 16:32:26 +00:00
* Most of methods created for x64, with no x86-32 support in mind. I don't see any sense in supporting 32 bit versions of Windows or wow64, however with small tweaks most of them will run under wow64 as well.
2015-10-12 10:38:28 +00:00
2019-08-27 05:29:47 +00:00
If you wondering why this still exists and working - here is the explanation - an official Microsoft WHITEFLAG (including totally incompetent statements as bonus)
2020-11-12 23:50:49 +00:00
https://devblogs.microsoft.com/oldnewthing/20160816-00/?p=94105
2016-12-30 04:51:00 +00:00
2018-09-02 07:28:59 +00:00
# Windows 10 support and testing policy
2020-10-05 17:17:21 +00:00
* UACMe tested only with LSTB/LTSC variants (1607/1809) and Last RTM-1 versions, e.g. if current version is 2004 it will be tested on 2004 (19041) and previous version 1909 (18363);
2018-09-02 07:28:59 +00:00
* Insider builds are not supported as methods may be fixed there.
2016-12-30 04:51:00 +00:00
2015-03-28 12:00:29 +00:00
# Protection
* Account without administrative privileges.
2015-07-11 10:13:14 +00:00
# Malware usage
2020-10-05 17:17:21 +00:00
* We do not take any responsibility for this tool usage in the malicious purposes. It is free, open-source and provided AS-IS for everyone.
2015-07-11 10:13:14 +00:00
2016-05-29 08:07:15 +00:00
# Other usage
2016-07-16 05:55:34 +00:00
* Currently used as "signature" by "THOR APT" scanner (handmade pattern matching fraudware from Germany). We do not take any responsibility for this tool usage in the fraudware;
2020-10-05 17:17:21 +00:00
* The repository https://github.com/hfiref0x/UACME and it contents are the only genuine source for UACMe code. We have nothing to do with external links to this project, mentions anywhere as well as modifications (forks);
2016-08-11 05:23:53 +00:00
* In July 2016 so-called "security company" Cymmetria released report about script-kiddie malware bundle called "Patchwork" and false flagged it as APT. They stated it was using "UACME method", which in fact is just slightly and unprofessionally modified injector dll from UACMe v1.9 and was using Carberp/Pitou hybrid method in malware self-implemented way. We do not take any responsibility for UACMe usage in the dubious advertising campaigns from third party "security companies".
2016-05-29 08:07:15 +00:00
2015-03-28 12:00:29 +00:00
# Build
2020-10-05 17:17:21 +00:00
* UACMe comes with full source code, written in C;
* In order to build from source you need Microsoft Visual Studio 2015 and later versions.
2016-03-18 04:45:19 +00:00
2019-10-27 06:34:59 +00:00
# Compiled Binaries
2020-10-19 03:56:29 +00:00
* They are not provided since 2.8.9 and will never be provided in future. The reasons (and why you too should not provide them to the general public):
* If you look at this project in a nutshell it is a HackTool, despite initial goal to be a demonstrator. Of course several AV's detects it as HackTool (MS WD for example), however most of VirusTotal patients detects it as generic "malware". Which is of course incorrect, however unfortunately some lazy malware writers blindly copy-paste code to their crapware (or even simple use this tool directly) thus some AV created signatures based on project code parts;
* By giving compiled binaries to everyone you make life of script-kiddies much easier because having need to compile from source works as perfect barrier for exceptionally dumb script-kiddies and "button-clickers";
2019-10-27 06:34:59 +00:00
* Having compiled binaries in the repository will ultimately lead to flagging this repository pages as malicious (due to above reasons) by various content filters (SmartScreen, Google Safe Browsing etc).
* This decision is a final and won't be changed.
2018-10-11 08:42:35 +00:00
## Instructions
* Select Platform ToolSet first for project in solution you want to build (Project->Properties->General):
* v120 for Visual Studio 2013;
* v140 for Visual Studio 2015;
2019-12-18 18:01:17 +00:00
* v141 for Visual Studio 2017;
* v142 for Visual Studio 2019.
2018-10-11 08:42:35 +00:00
* For v140 and above set Target Platform Version (Project->Properties->General):
* If v140 then select 8.1 (Note that Windows 8.1 SDK must be installed);
2019-12-18 18:01:17 +00:00
* If v141/v142 then select 10 (Note that Windows 10 SDK must be installed).
2020-10-19 03:56:29 +00:00
* To build working binary:
* Undefine KUMA_STUB
* Compile payload units
* Compile Naka module
* Encrypt all payload units using Naka module
* Generate secret blobs for these units using Naka module
* Move compiled units and secret blobs to the Akagi\Bin directory
* Rebuild Akagi
2018-10-11 08:42:35 +00:00
2020-10-19 03:56:29 +00:00
* Can be built with SDK 8.1 and later versions.
2018-10-11 08:42:35 +00:00
2016-03-18 04:45:19 +00:00
# References
* Windows 7 UAC whitelist, http://www.pretentiousname.com/misc/win7_uac_whitelist2.html
* Malicious Application Compatibility Shims, https://www.blackhat.com/docs/eu-15/materials/eu-15-Pierce-Defending-Against-Malicious-Application-Compatibility-Shims-wp.pdf
2016-07-16 05:55:34 +00:00
* Junfeng Zhang from WinSxS dev team blog, https://blogs.msdn.microsoft.com/junfeng/
2016-07-08 08:51:48 +00:00
* Beyond good ol' Run key, series of articles, http://www.hexacorn.com/blog
2019-12-15 03:21:53 +00:00
* KernelMode.Info UACMe thread, https://www.kernelmode.info/forum/viewtopicf985.html?f=11& t=3643
2017-01-17 06:17:40 +00:00
* Command Injection/Elevation - Environment Variables Revisited, https://breakingmalware.com/vulnerabilities/command-injection-and-elevation-environment-variables-revisited
2017-01-18 07:45:50 +00:00
* "Fileless" UAC Bypass Using eventvwr.exe and Registry Hijacking, https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/
2017-02-07 17:37:31 +00:00
* Bypassing UAC on Windows 10 using Disk Cleanup, https://enigma0x3.net/2016/07/22/bypassing-uac-on-windows-10-using-disk-cleanup/
2017-02-09 07:37:03 +00:00
* Using IARPUninstallStringLauncher COM interface to bypass UAC, http://www.freebuf.com/articles/system/116611.html
2017-03-15 06:44:03 +00:00
* Bypassing UAC using App Paths, https://enigma0x3.net/2017/03/14/bypassing-uac-using-app-paths/
2017-03-25 12:39:31 +00:00
* "Fileless" UAC Bypass using sdclt.exe, https://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe/
2017-05-09 03:39:44 +00:00
* UAC Bypass or story about three escalations, https://habrahabr.ru/company/pm/blog/328008/
2017-05-26 09:23:18 +00:00
* Exploiting Environment Variables in Scheduled Tasks for UAC Bypass, https://tyranidslair.blogspot.ru/2017/05/exploiting-environment-variables-in.html
* First entry: Welcome and fileless UAC bypass, https://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass/
2017-05-27 11:01:47 +00:00
* Reading Your Way Around UAC in 3 parts:
1. https://tyranidslair.blogspot.ru/2017/05/reading-your-way-around-uac-part-1.html
2. https://tyranidslair.blogspot.ru/2017/05/reading-your-way-around-uac-part-2.html
3. https://tyranidslair.blogspot.ru/2017/05/reading-your-way-around-uac-part-3.html
2017-08-16 04:57:52 +00:00
* Research on CMSTP.exe, https://msitpros.com/?p=3960
2018-05-25 08:27:20 +00:00
* UAC bypass via elevated .NET applications, https://offsec.provadys.com/UAC-bypass-dotnet.html
2018-11-10 09:42:19 +00:00
* UAC Bypass by Mocking Trusted Directories, https://medium.com/tenable-techblog/uac-bypass-by-mocking-trusted-directories-24a96675f6e
2019-01-25 06:42:24 +00:00
* Yet another sdclt UAC bypass, http://blog.sevagas.com/?Yet-another-sdclt-UAC-bypass
* UAC Bypass via SystemPropertiesAdvanced.exe and DLL Hijacking, https://egre55.github.io/system-properties-uac-bypass/
2019-02-17 05:01:05 +00:00
* Accessing Access Tokens for UIAccess, https://tyranidslair.blogspot.com/2019/02/accessing-access-tokens-for-uiaccess.html
2019-03-16 07:22:48 +00:00
* Fileless UAC Bypass in Windows Store Binary, https://www.activecyber.us/1/post/2019/03/windows-uac-bypass.html
2019-12-18 18:01:17 +00:00
* Calling Local Windows RPC Servers from .NET, https://googleprojectzero.blogspot.com/2019/12/calling-local-windows-rpc-servers-from.html
2020-05-05 06:16:44 +00:00
* Microsoft Windows 10 UAC bypass local privilege escalation exploit, https://packetstormsecurity.com/files/155927/Microsoft-Windows-10-Local-Privilege-Escalation.html
2020-10-05 17:33:41 +00:00
* UACMe 3.5, WD and the ways of mitigation, https://swapcontext.blogspot.com/2020/10/uacme-35-wd-and-ways-of-mitigation.html
2020-11-02 18:03:28 +00:00
* UAC bypasses from COMAutoApprovalList, https://swapcontext.blogspot.com/2020/11/uac-bypasses-from-comautoapprovallist.html
2017-05-27 11:01:47 +00:00
2015-03-28 12:00:29 +00:00
# Authors
2020-12-27 08:23:36 +00:00
(c) 2014 - 2021 UACMe Project
2017-07-13 13:12:55 +00:00
2018-07-14 17:15:02 +00:00
[![HitCount ](http://hits.dwyl.io/hfiref0x/uacme.svg )](http://hits.dwyl.io/hfiref0x/uacme)