Skip to content

Commit 19ea556

Browse files
committed
feat(rules): Add UAC bypass via Program Compatibility Assistant scheduled task hijack rule
Detects attempts to bypass User Account Control (UAC) by abusing the Program Compatibility Assistant (PCA) scheduled task to achieve unauthorized privilege escalation. Adversaries can leverage a trusted Windows component and its associated task execution context to spawn elevated processes without triggering standard UAC consent prompts.
1 parent d5552d1 commit 19ea556

File tree

1 file changed

+31
-0
lines changed

1 file changed

+31
-0
lines changed
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
name: UAC bypass via Program Compatibility Assistant scheduled task hijack
2+
id: 73de8712-f3a7-483e-b15f-6cc29c415511
3+
version: 1.0.0
4+
description: |
5+
Detects attempts to bypass User Account Control (UAC) by abusing the
6+
Program Compatibility Assistant (PCA) scheduled task to achieve unauthorized
7+
privilege escalation. Adversaries can leverage a trusted Windows component and
8+
its associated task execution context to spawn elevated processes without triggering
9+
standard UAC consent prompts.
10+
labels:
11+
tactic.id: TA0004
12+
tactic.name: Privilege Escalation
13+
tactic.ref: https://attack.mitre.org/tactics/TA0004/
14+
technique.id: T1548
15+
technique.name: Abuse Elevation Control Mechanism
16+
technique.ref: https://attack.mitre.org/techniques/T1548/
17+
subtechnique.id: T1548.002
18+
subtechnique.name: Bypass User Account Control
19+
subtechnique.ref: https://attack.mitre.org/techniques/T1548/002/
20+
references:
21+
- https://github.com/hfiref0x/UACME
22+
23+
condition: >
24+
spawn_process and
25+
ps.parent.name ~= 'taskhostw.exe' and ps.token.integrity_level = 'HIGH' and
26+
thread.callstack.summary imatches 'ntdll.dll|KernelBase.dll|kernel32.dll|pcadm.dll|ntdll.dll|KernelBase.dll|wdi.dll|*' and
27+
not foreach(thread._callstack, $frame, $frame.module imatches '?:\\Windows\\System32\\pcadm.dll')
28+
29+
severity: high
30+
31+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)