prompt
stringclasses
508 values
procedure
stringlengths
20
478
Abuse Elevation Control Mechanism:Bypass User Account Control
AppleJeus has presented the user with a UAC prompt to elevate privileges while installing.
Abuse Elevation Control Mechanism:Bypass User Account Control
It has bypassed UAC.
Abuse Elevation Control Mechanism:Bypass User Account Control
It has a function in the initial dropper to bypass Windows UAC in order to execute the next payload with higher privileges.
Abuse Elevation Control Mechanism:Bypass User Account Control
AutoIt backdoor attempts to escalate privileges by bypassing User Access Control.
Abuse Elevation Control Mechanism:Bypass User Account Control
Avaddon bypasses UAC using the CMSTPLUA COM interface.
Abuse Elevation Control Mechanism:Bypass User Account Control
Bad Rabbit has attempted to bypass UAC and gain elevated administrative privileges.
Abuse Elevation Control Mechanism:Bypass User Account Control
BADHATCH can utilize the CMSTPLUA COM interface and the SilentCleanup task to bypass UAC.
Abuse Elevation Control Mechanism:Bypass User Account Control
BitPaymer can suppress UAC prompts by setting the HKCU\Software\Classes\ms-settings\shell\open\command registry key on Windows 10 or HKCU\Software\Classes\mscfile\shell\open\command on Windows 7 and launching the eventvwr.msc process, which launches BitPaymer with elevated privileges.
Abuse Elevation Control Mechanism:Bypass User Account Control
BlackCat can bypass UAC to escalate privileges.
Abuse Elevation Control Mechanism:Bypass User Account Control
BlackEnergy attempts to bypass default User Access Control (UAC) settings by exploiting a backward-compatibility setting found in Windows 7 and later.
Abuse Elevation Control Mechanism:Bypass User Account Control
It has used a Windows 10 specific tool and xxmm to bypass UAC for privilege escalation.
Abuse Elevation Control Mechanism:Bypass User Account Control
Bumblebee has the ability to bypass UAC to deploy post exploitation tools with elevated privileges.
Abuse Elevation Control Mechanism:Bypass User Account Control
Clambling has the ability to bypass UAC using a passuac.dll file.
Abuse Elevation Control Mechanism:Bypass User Account Control
It has bypassed UAC.
Abuse Elevation Control Mechanism:Bypass User Account Control
Cobalt Strike can use a number of known techniques to bypass Windows UAC.
Abuse Elevation Control Mechanism:Bypass User Account Control
CSPY Downloader can bypass UAC using the SilentCleanup task to execute the binary with elevated privileges.
Abuse Elevation Control Mechanism:Bypass User Account Control
Downdelph bypasses UAC to escalate privileges by using a custom "RedirectEXE" shim database.
Abuse Elevation Control Mechanism:Bypass User Account Control
It has used the Fodhelper UAC bypass technique to gain elevated privileges.
Abuse Elevation Control Mechanism:Bypass User Account Control
Empire includes various modules to attempt to bypass UAC for escalation of privileges.
Abuse Elevation Control Mechanism:Bypass User Account Control
It has used PowerShell to bypass UAC.
Abuse Elevation Control Mechanism:Bypass User Account Control
FinFisher performs UAC bypass.
Abuse Elevation Control Mechanism:Bypass User Account Control
Gelsemium can bypass UAC to elevate process privileges on a compromised host.
Abuse Elevation Control Mechanism:Bypass User Account Control
Grandoreiro can bypass UAC by registering as the default handler for .MSC files.
Abuse Elevation Control Mechanism:Bypass User Account Control
H1N1 bypasses user access control by using a DLL hijacking vulnerability in the Windows Update Standalone Installer (wusa.exe).
Abuse Elevation Control Mechanism:Bypass User Account Control
InvisiMole can use fileless UAC bypass and create an elevated COM object to escalate privileges.
Abuse Elevation Control Mechanism:Bypass User Account Control
Koadic has 2 methods for elevating integrity. It can bypass UAC through eventvwr.exe and sdclt.exe.
Abuse Elevation Control Mechanism:Bypass User Account Control
KOCTOPUS will perform UAC bypass either through fodhelper.exe or eventvwr.exe.
Abuse Elevation Control Mechanism:Bypass User Account Control
KONNI has bypassed UAC by performing token impersonation as well as an RPC-based method, this included bypassing UAC set to "AlwaysNotify".
Abuse Elevation Control Mechanism:Bypass User Account Control
Lokibot has utilized multiple techniques to bypass UAC.
Abuse Elevation Control Mechanism:Bypass User Account Control
It uses various techniques to bypass UAC.
Abuse Elevation Control Mechanism:Bypass User Account Control
During Operation Honeybee, the threat actors used the malicious NTWDBLIB.DLL and cliconfig.exe to bypass UAC protections.
Abuse Elevation Control Mechanism:Bypass User Account Control
It bypassed User Access Control (UAC).
Abuse Elevation Control Mechanism:Bypass User Account Control
PipeMon installer can use UAC bypass techniques to install the payload.
Abuse Elevation Control Mechanism:Bypass User Account Control
An older variant of PLAINTEE performs UAC bypass.
Abuse Elevation Control Mechanism:Bypass User Account Control
PoshC2 can utilize multiple methods to bypass UAC.
Abuse Elevation Control Mechanism:Bypass User Account Control
Pupy can bypass Windows UAC through either DLL hijacking, eventvwr, or appPaths.
Abuse Elevation Control Mechanism:Bypass User Account Control
QuasarRAT can generate a UAC pop-up Window to prompt the target user to run a command as the administrator.
Abuse Elevation Control Mechanism:Bypass User Account Control
Ramsay can use UACMe for privilege escalation.
Abuse Elevation Control Mechanism:Bypass User Account Control
RCSession can bypass UAC to escalate privileges.
Abuse Elevation Control Mechanism:Bypass User Account Control
Remcos has a command for UAC bypassing.
Abuse Elevation Control Mechanism:Bypass User Account Control
It can attempt to run the program as admin, then show a fake error message and a legitimate UAC bypass prompt to the user in an attempt to socially engineer the user into escalating privileges.
Abuse Elevation Control Mechanism:Bypass User Account Control
Saint Bot has attempted to bypass UAC using fodhelper.exe to escalate privileges.
Abuse Elevation Control Mechanism:Bypass User Account Control
Sakula contains UAC bypass code for both 32- and 64-bit systems.
Abuse Elevation Control Mechanism:Bypass User Account Control
Shamoon attempts to disable UAC remote restrictions by modifying the Registry.
Abuse Elevation Control Mechanism:Bypass User Account Control
ShimRat has hijacked the cryptbase.dll within migwiz.exe to escalate privileges. This prevented the User Access Control window from appearing.
Abuse Elevation Control Mechanism:Bypass User Account Control
SILENTTRINITY contains a number of modules that can bypass UAC, including through Window's Device Manager, Manage Optional Features, and an image hijack on the .msc file extension.
Abuse Elevation Control Mechanism:Bypass User Account Control
A It tool can use a public UAC bypass method to elevate privileges.
Abuse Elevation Control Mechanism:Bypass User Account Control
UACMe contains many methods for bypassing Windows User Account Control on multiple versions of the operating system.
Abuse Elevation Control Mechanism:Bypass User Account Control
WarzoneRAT can use sdclt.exe to bypass UAC in Windows 10 to escalate privileges; for older Windows versions WarzoneRAT can use the IFileOperation exploit to bypass the UAC module.
Abuse Elevation Control Mechanism:Bypass User Account Control
WastedLocker can perform a UAC bypass if it is not executed with administrator rights or if the infected host runs Windows Vista or later.
Abuse Elevation Control Mechanism:Bypass User Account Control
Winnti for Windows can use a variant of the sysprep UAC bypass.
Abuse Elevation Control Mechanism:Bypass User Account Control
Many ZeroT samples can perform UAC bypass by using eventvwr.exe to execute a malicious file.
Abuse Elevation Control Mechanism:Sudo and Sudo Caching
Cobalt Strike can use sudo to run a command.
Abuse Elevation Control Mechanism:Sudo and Sudo Caching
Dok adds admin ALL=(ALL) NOPASSWD: ALL to the /etc/sudoers file.
Abuse Elevation Control Mechanism:Sudo and Sudo Caching
Proton modifies the tty_tickets line in the sudoers file.
Abuse Elevation Control Mechanism:Elevated Execution with Prompt
OSX/Shlayer can escalate privileges to root by asking the user for credentials.
Access Token Manipulation
AppleSeed can gain system level privilege by passing SeDebugPrivilege to the AdjustTokenPrivilege API.
Access Token Manipulation
BlackCat has the ability modify access tokens.
Access Token Manipulation
It has used JuicyPotato to abuse the SeImpersonate token privilege to escalate from web application pool accounts to NT Authority\SYSTEM.
Access Token Manipulation
During C0017, It used a ConfuserEx obfuscated BADPOTATO exploit to abuse named-pipe impersonation for local NT AUTHORITY\SYSTEM privilege escalation.
Access Token Manipulation
Cuba has used SeDebugPrivilege and AdjustTokenPrivileges to elevate privileges.
Access Token Manipulation
Duqu examines running system processes for tokens that have specific system privileges. If it finds one, it will copy the token and store it for later use. Eventually it will start new processes with the stored token attached. It can also steal tokens to acquire administrative privileges.
Access Token Manipulation
Empire can use PowerSploit's Invoke-TokenManipulation to manipulate access tokens.
Access Token Manipulation
It has used has used Metasploit’s named-pipe impersonation technique to escalate privileges.
Access Token Manipulation
Gelsemium can use token manipulation to bypass UAC on Windows7 systems.
Access Token Manipulation
HermeticWiper can use AdjustTokenPrivileges to grant itself privileges for debugging with SeDebugPrivilege, creating backups with SeBackupPrivilege, loading drivers with SeLoadDriverPrivilege, and shutting down a local system with SeShutdownPrivilege.
Access Token Manipulation
Hydraq creates a backdoor through which remote attackers can adjust token privileges.
Access Token Manipulation
KillDisk has attempted to get the access token of a process by calling OpenProcessToken. If KillDisk gets the access token, then it attempt to modify the token privileges with AdjustTokenPrivileges.
Access Token Manipulation
Mafalda can use AdjustTokenPrivileges() to elevate privileges.
Access Token Manipulation
MegaCortex can enable SeDebugPrivilege and adjust token privileges.
Access Token Manipulation
PoshC2 can use Invoke-TokenManipulation for manipulating tokens.
Access Token Manipulation
PowerSploit's Invoke-TokenManipulation Exfiltration module can be used to manipulate tokens.
Access Token Manipulation
Ryuk has attempted to adjust its token privileges to have the SeDebugPrivilege.
Access Token Manipulation
Sliver has the ability to manipulate user tokens on targeted Windows systems.
Access Token Manipulation
SslMM contains a feature to manipulate process privileges and tokens.
Access Token Manipulation
SUNSPOT modified its security token to grants itself debugging privileges by adding SeDebugPrivilege.
Access Token Manipulation:Token Impersonation
It has used CVE-2015-1701 to access the SYSTEM token and copy it into the current process as part of privilege escalation.
Access Token Manipulation:Token Impersonation
Aria-body has the ability to duplicate a token from ntprint.exe.
Access Token Manipulation:Token Impersonation
BADHATCH can impersonate a lsass.exe or vmtoolsd.exe token.
Access Token Manipulation:Token Impersonation
BitPaymer can use the tokens of users to create processes on infected systems.
Access Token Manipulation:Token Impersonation
Cobalt Strike can steal access tokens from exiting processes.
Access Token Manipulation:Token Impersonation
Emotet has the ability to duplicate the user’s token.
Access Token Manipulation:Token Impersonation
It has used a malicious framework designed to impersonate the lsass.exe/vmtoolsd.exe token.
Access Token Manipulation:Token Impersonation
FinFisher uses token manipulation with NtFilterToken as part of UAC bypass.
Access Token Manipulation:Token Impersonation
Okrum can impersonate a logged-on user's security context using a call to the ImpersonateLoggedOnUser API.
Access Token Manipulation:Token Impersonation
Pupy can obtain a list of SIDs and provide the option for selecting process tokens to impersonate.
Access Token Manipulation:Token Impersonation
REvil can obtain the token from the user that launched the explorer.exe process to avoid affecting the desktop of the SYSTEM user.
Access Token Manipulation:Token Impersonation
Shamoon can impersonate tokens using LogonUser, ImpersonateLoggedOnUser, and ImpersonateNamedPipeClient.
Access Token Manipulation:Token Impersonation
SILENTTRINITY can find a process owned by a specific user and impersonate the associated token.
Access Token Manipulation:Token Impersonation
Siloscape impersonates the main thread of CExecSvc.exe by calling NtImpersonateThread.
Access Token Manipulation:Token Impersonation
Stuxnet attempts to impersonate an anonymous token to enumerate bindings in the service control manager.
Access Token Manipulation:Token Impersonation
Tarrask leverages token theft to obtain lsass.exe security permissions.
Access Token Manipulation:Create Process with Token
Aria-body has the ability to execute a process using runas.
Access Token Manipulation:Create Process with Token
Azorult can call WTSQueryUserToken and CreateProcessAsUser to start a new process with local system privileges.
Access Token Manipulation:Create Process with Token
Bankshot grabs a user token using WTSQueryUserToken and then creates a process by impersonating a logged-on user.
Access Token Manipulation:Create Process with Token
Empire can use Invoke-RunAs to make tokens.
Access Token Manipulation:Create Process with Token
KONNI has duplicated the token of a high integrity process to spawn an instance of cmd.exe under an impersonated user.
Access Token Manipulation:Create Process with Token
It keylogger KiloAlfa obtains user tokens from interactive sessions to execute itself with API call CreateProcessAsUserA under that user's context.
Access Token Manipulation:Create Process with Token
PipeMon can attempt to gain administrative privileges using token impersonation.
Access Token Manipulation:Create Process with Token
PoshC2 can use Invoke-RunAs to make tokens.