2015-03-28 12:00:29 +00:00
# UACMe
* Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor.
# System Requirements
2018-02-09 07:12:27 +00:00
* x86-32/x64 Windows 7/8/8.1/10 (client, some methods however works on server version too).
2015-03-28 12:00:29 +00:00
* Admin account with UAC set on default settings required.
# Usage
2015-09-17 07:31:36 +00:00
Run executable from command line: akagi32 [Key] [Param] or akagi64 [Key] [Param]. See "Run examples" below for more info.
2015-10-12 15:05:38 +00:00
First param is number of method to use, second is optional command (executable file name including full path) to run. Second param can be empty - in this case program will execute elevated cmd.exe from system32 folder.
2015-09-17 07:31:36 +00:00
2017-03-02 18:30:15 +00:00
Keys (watch debug output with dbgview or similar for more info):
2017-02-13 16:32:26 +00:00
1. Author: Leo Davidson
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\sysprep\sysprep.exe
2017-02-13 16:32:26 +00:00
* Component(s): cryptbase.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmStandardAutoElevation
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 8.1 (9600)
* How: sysprep.exe hardened LoadFrom manifest elements
2. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\sysprep\sysprep.exe
2017-02-13 16:32:26 +00:00
* Component(s): ShCore.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmStandardAutoElevation
2017-02-13 16:32:26 +00:00
* Works from: Windows 8.1 (9600)
* Fixed in: Windows 10 TP (> 9600)
* How: Side effect of ShCore.dll moving to \KnownDlls
3. Author: Leo Davidson derivative by WinNT/Pitou
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\oobe\setupsqm.exe
2017-02-13 16:32:26 +00:00
* Component(s): WdsCore.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmStandardAutoElevation
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
2017-03-26 03:48:36 +00:00
* Fixed in: Windows 10 TH2 (10558)
2017-02-13 16:32:26 +00:00
* How: side effect of OOBE redesign
4. Author: Jon Ericson, WinNT/Gootkit, mzH
* Type: AppCompat
* Method: RedirectEXE Shim
2017-02-17 17:56:13 +00:00
* Target(s): \system32\cliconfg.exe
2017-02-13 16:32:26 +00:00
* Component(s): -
2018-02-09 07:12:27 +00:00
* Implementation: ucmShimRedirectEXE
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TP (> 9600)
2017-07-13 13:12:55 +00:00
* How: Sdbinst.exe autoelevation removed, KB3045645/KB3048097 for rest Windows versions
2017-02-13 16:32:26 +00:00
5. Author: WinNT/Simda
* Type: Elevated COM interface
* Method: ISecurityEditor
* Target(s): HKLM registry keys
* Component(s): -
2018-02-22 05:31:35 +00:00
* Implementation: ucmSimdaTurnOffUac
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH1 (10147)
* How: ISecurityEditor interface method changed
6. Author: Win32/Carberp
* Type: Dll Hijack
* Method: WUSA
2017-02-17 17:56:13 +00:00
* Target(s): \ehome\mcx2prov.exe, \system32\migwiz\migwiz.exe
2017-02-13 16:32:26 +00:00
* Component(s): WdsCore.dll, CryptBase.dll, CryptSP.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmWusaMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH1 (10147)
* How: WUSA /extract option removed
7. Author: Win32/Carberp derivative
* Type: Dll Hijack
* Method: WUSA
2017-02-17 17:56:13 +00:00
* Target(s): \system32\cliconfg.exe
2017-02-13 16:32:26 +00:00
* Component(s): ntwdblib.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmWusaMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH1 (10147)
* How: WUSA /extract option removed
8. Author: Leo Davidson derivative by Win32/Tilon
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\sysprep\sysprep.exe
2017-02-13 16:32:26 +00:00
* Component(s): Actionqueue.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmStandardAutoElevation
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 8.1 (9600)
* How: sysprep.exe hardened LoadFrom manifest
9. Author: Leo Davidson, WinNT/Simda, Win32/Carberp derivative
* Type: Dll Hijack
* Method: IFileOperation, ISecurityEditor, WUSA
2017-02-17 17:56:13 +00:00
* Target(s): IFEO registry keys, \system32\cliconfg.exe
2017-02-13 16:32:26 +00:00
* Component(s): Attacker defined Application Verifier Dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmAvrfMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH1 (10147)
* How: WUSA /extract option removed, ISecurityEditor interface method changed
10. Author: WinNT/Pitou, Win32/Carberp derivative
* Type: Dll Hijack
* Method: IFileOperation, WUSA
2017-02-17 17:56:13 +00:00
* Target(s): \system32\\{New}or{Existing}\\{autoelevated}.exe, e.g. winsat.exe
2017-02-13 16:32:26 +00:00
* Component(s): Attacker defined dll, e.g. PowProf.dll, DevObj.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmWinSATMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH2 (10548)
2017-02-17 17:56:13 +00:00
* How: AppInfo elevated application path control hardening
2017-02-13 16:32:26 +00:00
11. Author: Jon Ericson, WinNT/Gootkit, mzH
2017-02-13 16:35:18 +00:00
* Type: AppCompat
2017-02-13 16:32:26 +00:00
* Method: Shim Memory Patch
2017-02-17 17:56:13 +00:00
* Target(s): \system32\iscsicli.exe
2017-02-13 16:32:26 +00:00
* Component(s): Attacker prepared shellcode
2018-02-09 07:12:27 +00:00
* Implementation: ucmShimPatch
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 8.1 (9600)
2017-07-13 13:12:55 +00:00
* How: Sdbinst.exe autoelevation removed, KB3045645/KB3048097 for rest Windows versions
2017-02-13 16:32:26 +00:00
12. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\sysprep\sysprep.exe
2017-02-13 16:32:26 +00:00
* Component(s): dbgcore.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmStandardAutoElevation
2017-02-13 16:32:26 +00:00
* Works from: Windows 10 TH1 (10240)
* Fixed in: Windows 10 TH2 (10565)
* How: sysprep.exe manifest updated
13. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\mmc.exe EventVwr.msc
2017-02-13 16:32:26 +00:00
* Component(s): elsext.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmMMCMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS1 (14316)
* How: Missing dependency removed
14. Author: Leo Davidson, WinNT/Sirefef derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system\credwiz.exe, \system32\wbem\oobe.exe
2017-02-13 16:32:26 +00:00
* Component(s): netutils.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmSirefefMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH2 (10548)
2017-02-17 17:56:13 +00:00
* How: AppInfo elevated application path control hardening
2017-02-13 16:32:26 +00:00
15. Author: Leo Davidson, Win32/Addrop, Metasploit derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\cliconfg.exe
2017-02-13 16:32:26 +00:00
* Component(s): ntwdblib.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmGenericAutoelevation
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS1 (14316)
* How: Cliconfg.exe autoelevation removed
16. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\GWX\GWXUXWorker.exe, \system32\inetsrv\inetmgr.exe
2017-02-13 16:32:26 +00:00
* Component(s): SLC.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmGWX
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS1 (14316)
* How: AppInfo elevated application path control and inetmgr executable hardening
17. Author: Leo Davidson derivative
* Type: Dll Hijack (Import forwarding)
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\sysprep\sysprep.exe
2017-02-13 16:32:26 +00:00
* Component(s): unbcl.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmStandardAutoElevation2
2017-03-25 12:39:31 +00:00
* Works from: Windows 8.1 (9600)
2017-02-13 16:32:26 +00:00
* Fixed in: Windows 10 RS1 (14371)
* How: sysprep.exe manifest updated
18. Author: Leo Davidson derivative
* Type: Dll Hijack (Manifest)
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\taskhost.exe, \system32\tzsync.exe (any ms exe without manifest)
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
* Implementation: ucmAutoElevateManifest
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS1 (14371)
* How: Manifest parsing logic reviewed
19. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\inetsrv\inetmgr.exe
2017-02-13 16:32:26 +00:00
* Component(s): MsCoree.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmInetMgrMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS1 (14376)
2017-05-02 06:47:46 +00:00
* How: inetmgr.exe executable manifest hardening, MitigationPolicy->ProcessImageLoadPolicy->PreferSystem32Images
2017-02-13 16:32:26 +00:00
20. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\mmc.exe, Rsop.msc
2017-02-13 16:32:26 +00:00
* Component(s): WbemComn.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmMMCMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
2017-06-30 05:59:47 +00:00
* Fixed in: Windows 10 RS3 (16232)
* How: Target requires wbemcomn.dll to be signed by MS
2017-02-13 16:32:26 +00:00
21. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation, SxS DotLocal
2017-02-17 17:56:13 +00:00
* Target(s): \system32\sysprep\sysprep.exe
2017-02-13 16:32:26 +00:00
* Component(s): comctl32.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmSXSMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
2017-06-30 05:59:47 +00:00
* Fixed in: Windows 10 RS3 (16232)
* How: sysprep.exe requires MS signed modules to load
2017-02-13 16:32:26 +00:00
22. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation, SxS DotLocal
2017-02-17 17:56:13 +00:00
* Target(s): \system32\consent.exe
2017-02-13 16:32:26 +00:00
* Component(s): comctl32.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmSXSMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
23. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\pkgmgr.exe
2017-02-13 16:32:26 +00:00
* Component(s): DismCore.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmDismMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
24. Author: BreakingMalware
* Type: Shell API
* Method: Environment variables expansion
2017-02-17 17:56:13 +00:00
* Target(s): \system32\CompMgmtLauncher.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
* Implementation: ucmCometMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS2 (15031)
* How: CompMgmtLauncher.exe autoelevation removed
25. Author: Enigma0x3
* Type: Shell API
* Method: Registry key manipulation
2017-02-17 17:56:13 +00:00
* Target(s): \system32\EventVwr.exe, \system32\CompMgmtLauncher.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
* Implementation: ucmHijackShellCommandMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS2 (15031)
* How: EventVwr.exe redesigned, CompMgmtLauncher.exe autoelevation removed
26. Author: Enigma0x3
* Type: Race Condition
* Method: File overwrite
2017-02-17 17:56:13 +00:00
* Target(s): %temp%\GUID\dismhost.exe
2017-02-13 16:32:26 +00:00
* Component(s): LogProvider.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmDiskCleanupRaceCondition
2017-02-13 16:32:26 +00:00
* Works from: Windows 10 TH1 (10240)
2017-05-26 10:11:33 +00:00
* AlwaysNotify compatible
2017-02-13 16:32:26 +00:00
* Fixed in: Windows 10 RS2 (15031)
* How: File security permissions altered
27. Author: ExpLife
* Type: Elevated COM interface
* Method: IARPUninstallStringLauncher
2018-02-09 07:12:27 +00:00
* Target(s): Attacker defined
* Component(s): Attacker defined
* Implementation: ucmUninstallLauncherMethod
2017-02-13 16:32:26 +00:00
* Works from: Windows 7 (7600)
2017-05-26 09:23:18 +00:00
* Fixed in: Windows 10 RS3 (16199)
* How: UninstallStringLauncher interface removed from COMAutoApprovalList
2017-03-13 04:21:30 +00:00
28. Author: Exploit/Sandworm
* Type: Whitelisted component
* Method: InfDefaultInstall
2018-02-09 07:12:27 +00:00
* Target(s): Attacker defined
* Component(s): Attacker defined
* Implementation: ucmSandwormMethod
2017-03-13 04:21:30 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 8.1 (9600)
* How: InfDefaultInstall.exe removed from g_lpAutoApproveEXEList (MS14-060)
2017-03-15 06:44:03 +00:00
29. Author: Enigma0x3
* Type: Shell API
* Method: Registry key manipulation
* Target(s): \system32\sdctl.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
* Implementation: ucmAppPathMethod
2017-06-22 07:17:35 +00:00
* Works from: Windows 10 TH1 (10240)
* Fixed in: Windows 10 RS3 (16215)
* How: Shell API update
2017-03-25 12:39:31 +00:00
30. Author: Leo Davidson derivative, lhc645
* Type: Dll Hijack
* Method: WOW64 logger
2017-03-25 12:42:21 +00:00
* Target(s): \syswow64\\{any elevated exe, e.g wusa.exe}
2017-03-25 12:39:31 +00:00
* Component(s): wow64log.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmWow64LoggerMethod
2017-03-25 12:39:31 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
31. Author: Enigma0x3
* Type: Shell API
* Method: Registry key manipulation
* Target(s): \system32\sdctl.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
* Implementation: ucmSdcltIsolatedCommandMethod
2017-06-22 07:17:35 +00:00
* Works from: Windows 10 TH1 (10240)
2017-10-30 03:30:38 +00:00
* Fixed in: Windows 10 RS4 (17025)
* How: Shell API / Windows components update
2017-05-09 03:39:44 +00:00
32. Author: xi-tauw
* Type: Dll Hijack
* Method: UIPI bypass with uiAccess application
* Target(s): \Program Files\Windows Media Player\osk.exe, \system32\EventVwr.exe, \system32\mmc.exe
* Component(s): duser.dll, osksupport.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmUiAccessMethod
2017-05-09 03:39:44 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2017-05-26 09:23:18 +00:00
33. Author: winscripting.blog
* Type: Shell API
* Method: Registry key manipulation
2018-04-16 01:04:42 +00:00
* Target(s): \system32\fodhelper.exe, \system32\computerdefaults.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
* Implementation: ucmMsSettingsDelegateExecuteMethod
2017-06-22 07:17:35 +00:00
* Works from: Windows 10 TH1 (10240)
2017-05-26 09:23:18 +00:00
* Fixed in: unfixed :see_no_evil:
* How: -
34. Author: James Forshaw
* Type: Shell API
* Method: Environment variables expansion
* Target(s): \system32\svchost.exe via \system32\schtasks.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
* Implementation: ucmDiskCleanupEnvironmentVariable
2017-05-26 10:11:33 +00:00
* Works from: Windows 8.1 (9600)
* AlwaysNotify compatible
2017-05-26 09:23:18 +00:00
* Fixed in: unfixed :see_no_evil:
* How: -
2017-05-27 11:01:47 +00:00
35. Author: CIA & James Forshaw
* Type: Impersonation
* Method: Token Manipulations
* Target(s): Autoelevated applications
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
* Implementation: ucmTokenModification
2017-05-27 11:01:47 +00:00
* Works from: Windows 7 (7600)
* AlwaysNotify compatible, see note
2018-06-12 18:33:49 +00:00
* Fixed in: Windows 10 RS5 (17686)
* How: ntoskrnl.exe->SeTokenCanImpersonate additional access token check added
2017-06-22 07:17:35 +00:00
36. Author: Thomas Vanhoutte
* Type: Race condition
* Method: NTFS reparse point & Dll Hijack
* Target(s): wusa.exe
* Component(s): dcomcnfg.exe, mmc.exe, ole32.dll, MsCoree.dll
2018-02-09 07:12:27 +00:00
* Implementation: ucmJunctionMethod
2017-06-22 07:17:35 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2017-06-30 05:59:47 +00:00
37. Author: Ernesto Fernandez, Thomas Vanhoutte
* Type: Dll Hijack
2017-07-13 13:12:55 +00:00
* Method: SxS DotLocal, NTFS reparse point
2017-06-30 05:59:47 +00:00
* Target(s): \system32\dccw.exe
* Component(s): GdiPlus.dll
2018-07-14 17:15:02 +00:00
* Implementation: ucmSXSDccwMethod
2017-06-30 05:59:47 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2017-07-13 13:12:55 +00:00
38. Author: Clement Rouault
* Type: Whitelisted component
* Method: APPINFO command line spoofing
* Target(s): \system32\mmc.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
2018-07-14 17:15:02 +00:00
* Implementation: ucmHakrilMethod
2017-07-13 13:12:55 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2017-07-21 10:31:38 +00:00
39. Author: Stefan Kanthak
* Type: Dll Hijack
* Method: .NET Code Profiler
* Target(s): \system32\mmc.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
2018-07-14 17:15:02 +00:00
* Implementation: ucmCorProfilerMethod
2017-07-21 10:31:38 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2017-07-30 07:01:34 +00:00
40. Author: Ruben Boonen
2018-05-25 08:27:20 +00:00
* Type: COM Handler Hijack
2017-07-30 07:01:34 +00:00
* Method: Registry key manipulation
* Target(s): \system32\mmc.exe, \System32\recdisc.exe
2018-02-09 07:12:27 +00:00
* Component(s): Attacker defined
2018-05-25 08:27:20 +00:00
* Implementation: ucmCOMHandlersMethod
2017-07-30 07:01:34 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2017-08-16 04:57:52 +00:00
41. Author: Oddvar Moe
* Type: Elevated COM interface
* Method: ICMLuaUtil
* Target(s): Attacker defined
* Component(s): Attacker defined
2018-02-09 07:12:27 +00:00
* Implementation: ucmCMLuaUtilShellExecMethod
2017-08-16 04:57:52 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2017-11-08 05:42:05 +00:00
42. Author: BreakingMalware and Enigma0x3
* Type: Elevated COM interface
* Method: IFwCplLua
* Target(s): Attacker defined
* Component(s): Attacker defined
2018-02-09 07:12:27 +00:00
* Implementation: ucmFwCplLuaMethod
2017-11-08 05:42:05 +00:00
* Works from: Windows 7 (7600)
2018-08-05 05:26:27 +00:00
* Fixed in: unfixed :see_no_evil:
* How: -
2017-11-10 06:31:20 +00:00
43. Author: Oddvar Moe derivative
* Type: Elevated COM interface
* Method: IColorDataProxy, ICMLuaUtil
* Target(s): Attacker defined
* Component(s): Attacker defined
2018-02-09 07:12:27 +00:00
* Implementation: ucmDccwCOMMethod
2017-11-10 06:31:20 +00:00
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2017-11-22 09:54:51 +00:00
44. Author: bytecode77
* Type: Shell API
* Method: Environment variables expansion
2017-11-23 16:14:08 +00:00
* Target(s): Multiple auto-elevated processes
2017-11-22 09:54:51 +00:00
* Component(s): Various per target
2018-07-14 17:15:02 +00:00
* Implementation: ucmVolatileEnvMethod
2017-11-22 09:54:51 +00:00
* Works from: Windows 7 (7600)
2017-11-23 16:14:08 +00:00
* Fixed in: Windows 10 RS3 (16299)
2017-11-22 09:54:51 +00:00
* How: Current user system directory variables ignored during process creation
2018-01-15 10:53:43 +00:00
45. Author: bytecode77
* Type: Shell API
* Method: Registry key manipulation
* Target(s): \system32\slui.exe
* Component(s): Attacker defined
2018-07-14 17:15:02 +00:00
* Implementation: ucmSluiHijackMethod
2018-01-15 10:53:43 +00:00
* Works from: Windows 8.1 (9600)
* Fixed in: unfixed :see_no_evil:
* How: -
2018-01-19 10:41:27 +00:00
46. Author: Anonymous
* Type: Race Condition
* Method: Registry key manipulation
* Target(s): \system32\BitlockerWizardElev.exe
* Component(s): Attacker defined
2018-02-09 07:12:27 +00:00
* Implementation: ucmBitlockerRCMethod
2018-01-19 10:41:27 +00:00
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS4 (>16299)
* How: Shell API update
2018-05-25 08:27:20 +00:00
47. Author: clavoillotte & 3gstudent
* Type: COM Handler Hijack
* Method: Registry key manipulation
* Target(s): \system32\mmc.exe
* Component(s): Attacker defined
* Implementation: ucmCOMHandlersMethod2
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
2018-05-25 08:29:19 +00:00
* How: -
2018-06-15 11:44:01 +00:00
48. Author: deroko
* Type: Elevated COM interface
* Method: ISPPLUAObject
* Target(s): Attacker defined
* Component(s): Attacker defined
* Implementation: ucmSPPLUAObjectMethod
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
2017-02-12 14:06:14 +00:00
2015-03-28 12:00:29 +00:00
Note:
2017-03-02 04:19:49 +00:00
* Method (6) unavailable in wow64 environment starting from Windows 8;
2015-04-30 07:39:41 +00:00
* Method (11) implemented in x86-32 version;
2017-07-13 13:15:09 +00:00
* Method (13) (19) (38) implemented only in x64 version;
2017-03-25 12:39:31 +00:00
* Method (14) require process injection, wow64 unsupported, use x64 version of this tool;
* Method (26) is still working, however it main advantage was UAC bypass on AlwaysNotify level. Since 15031 it is gone;
2017-05-27 11:01:47 +00:00
* Method (30) require x64 because it abuses WOW64 subsystem feature;
2017-07-14 05:50:55 +00:00
* Method (35) AlwaysNotify compatible as there always will be running autoelevated apps or user will have to launch them anyway;
* Method (38) require internet connection as it executes remote script located at github.com/hfiref0x/Beacon/blob/master/uac/exec.html.
2015-03-28 12:00:29 +00:00
Run examples:
* akagi32.exe 1
* akagi64.exe 3
2015-09-17 07:31:36 +00:00
* akagi32 1 c:\windows\system32\calc.exe
* akagi64 3 c:\windows\system32\charmap.exe
2015-03-28 12:00:29 +00:00
# Warning
2015-05-29 06:43:56 +00:00
* This tool shows ONLY popular UAC bypass method used by malware, and reimplement some of them in a different way improving original concepts. There are exists different, not yet known to general public methods, be aware of this;
2015-03-28 12:00:29 +00:00
* Using (5) method will permanently turn off UAC (after reboot), make sure to do this in test environment or don't forget to re-enable UAC after tool usage;
2015-04-25 05:16:44 +00:00
* Using (5), (9) methods will permanently compromise security of target keys (UAC Settings key for (5) and IFEO for (9)), if you do tests on your real machine - restore keys security manually after you complete this tool usage;
2015-09-17 07:31:36 +00:00
* This tool is not intended for AV tests and not tested to work in aggressive AV environment, if you still plan to use it with installed bloatware AV soft - you use it at your own risk;
2016-05-12 03:21:26 +00:00
* Some AV may flag this tool as HackTool, MSE/WinDefender constantly marks it as malware, nope;
2016-07-05 08:28:44 +00:00
* If you run this program on real computer remember to remove all program leftovers after usage, for more info about files it drops to system folders see source code;
2017-02-13 16:32:26 +00:00
* Most of methods created for x64, with no x86-32 support in mind. I don't see any sense in supporting 32 bit versions of Windows or wow64, however with small tweaks most of them will run under wow64 as well.
2015-10-12 10:38:28 +00:00
2016-12-30 04:51:00 +00:00
If you wondering why this still exist and work here is the explanation, an official Microsoft WHITEFLAG (including totally incompetent statements as bonus)
https://blogs.msdn.microsoft.com/oldnewthing/20160816-00/?p=94105
2015-03-28 12:00:29 +00:00
# Protection
* Account without administrative privileges.
2015-07-11 10:13:14 +00:00
# Malware usage
2017-11-30 04:49:04 +00:00
* It is currently known that UACMe used by Adware/Multiplug (9), by Win32/Dyre (3), by Win32/Empercrypt (10 & 13), by IcedID downloader (35 & 41). We do not take any responsibility for this tool usage in the malicious purposes. It is free, open-source and provided AS-IS for everyone.
2015-07-11 10:13:14 +00:00
2016-05-29 08:07:15 +00:00
# Other usage
2016-07-16 05:55:34 +00:00
* Currently used as "signature" by "THOR APT" scanner (handmade pattern matching fraudware from Germany). We do not take any responsibility for this tool usage in the fraudware;
2018-02-09 07:12:27 +00:00
* The scamware project called "uacguard" has references to UACMe from their platform. We do not take any responsibility for this tool usage in the scamware. The repository https://github.com/hfiref0x/UACME and it contents are the only genuine source for UACMe code. We have nothing to do with external links to this project, mentions anywhere as well as modifications (forks);
2016-08-11 05:23:53 +00:00
* In July 2016 so-called "security company" Cymmetria released report about script-kiddie malware bundle called "Patchwork" and false flagged it as APT. They stated it was using "UACME method", which in fact is just slightly and unprofessionally modified injector dll from UACMe v1.9 and was using Carberp/Pitou hybrid method in malware self-implemented way. We do not take any responsibility for UACMe usage in the dubious advertising campaigns from third party "security companies".
2016-05-29 08:07:15 +00:00
2015-03-28 12:00:29 +00:00
# Build
2018-06-04 15:50:48 +00:00
* UACMe comes with full source code, written in C with some parts written in C#;
2016-04-16 03:46:41 +00:00
* In order to build from source you need Microsoft Visual Studio 2013/2015 U2 and later versions.
2016-03-18 04:45:19 +00:00
# References
* Windows 7 UAC whitelist, http://www.pretentiousname.com/misc/win7_uac_whitelist2.html
* Malicious Application Compatibility Shims, https://www.blackhat.com/docs/eu-15/materials/eu-15-Pierce-Defending-Against-Malicious-Application-Compatibility-Shims-wp.pdf
2016-07-16 05:55:34 +00:00
* Junfeng Zhang from WinSxS dev team blog, https://blogs.msdn.microsoft.com/junfeng/
2016-07-08 08:51:48 +00:00
* Beyond good ol' Run key, series of articles, http://www.hexacorn.com/blog
2016-07-08 08:49:51 +00:00
* KernelMode.Info UACMe thread, http://www.kernelmode.info/forum/viewtopic.php?f=11& t=3643
2017-01-17 06:17:40 +00:00
* Command Injection/Elevation - Environment Variables Revisited, https://breakingmalware.com/vulnerabilities/command-injection-and-elevation-environment-variables-revisited
2017-01-18 07:45:50 +00:00
* "Fileless" UAC Bypass Using eventvwr.exe and Registry Hijacking, https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/
2017-02-07 17:37:31 +00:00
* Bypassing UAC on Windows 10 using Disk Cleanup, https://enigma0x3.net/2016/07/22/bypassing-uac-on-windows-10-using-disk-cleanup/
2017-02-09 07:37:03 +00:00
* Using IARPUninstallStringLauncher COM interface to bypass UAC, http://www.freebuf.com/articles/system/116611.html
2017-03-15 06:44:03 +00:00
* Bypassing UAC using App Paths, https://enigma0x3.net/2017/03/14/bypassing-uac-using-app-paths/
2017-03-25 12:39:31 +00:00
* "Fileless" UAC Bypass using sdclt.exe, https://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe/
2017-05-09 03:39:44 +00:00
* UAC Bypass or story about three escalations, https://habrahabr.ru/company/pm/blog/328008/
2017-05-26 09:23:18 +00:00
* Exploiting Environment Variables in Scheduled Tasks for UAC Bypass, https://tyranidslair.blogspot.ru/2017/05/exploiting-environment-variables-in.html
* First entry: Welcome and fileless UAC bypass, https://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass/
2017-05-27 11:01:47 +00:00
* Reading Your Way Around UAC in 3 parts:
1. https://tyranidslair.blogspot.ru/2017/05/reading-your-way-around-uac-part-1.html
2. https://tyranidslair.blogspot.ru/2017/05/reading-your-way-around-uac-part-2.html
3. https://tyranidslair.blogspot.ru/2017/05/reading-your-way-around-uac-part-3.html
2017-08-16 04:57:52 +00:00
* Research on CMSTP.exe, https://msitpros.com/?p=3960
2018-05-25 08:27:20 +00:00
* UAC bypass via elevated .NET applications, https://offsec.provadys.com/UAC-bypass-dotnet.html
2017-05-27 11:01:47 +00:00
2015-03-28 12:00:29 +00:00
# Authors
2018-01-08 17:25:34 +00:00
(c) 2014 - 2018 UACMe Project
2017-07-13 13:12:55 +00:00
# 3rd party components usage
MinHook - The Minimalistic x86/x64 API Hooking Library for Windows, https://github.com/TsudaKageyu/minhook
2018-07-14 17:15:02 +00:00
[![HitCount ](http://hits.dwyl.io/hfiref0x/uacme.svg )](http://hits.dwyl.io/hfiref0x/uacme)