Concrete signature match: Hack Tool - Tool used to exploit vulnerabilities for 32-bit Windows platform, family UACBypass
This is a detected HackTool designed to bypass User Account Control (UAC) on Windows systems. It likely exploits legitimate Windows features, such as `DelegateExecute` or specific registry paths like `ms-settings`, to escalate privileges and execute commands with administrative rights without user consent.
Relevant strings associated with this threat: - |#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID) - }#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID) - &|#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID) - &}#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID) - y*|#56a863a9-875e-4185-98a7-b882c64b5ce5 (NID) - y*}#56a863a9-875e-4185-98a7-b882c64b5ce5 (NID) - C|#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID) - C}#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID) - L|#3b576869-a4ec-4529-8536-b80a7769e899 (NID) - L}#3b576869-a4ec-4529-8536-b80a7769e899 (NID) - |#5beb7efe-fd9a-4556-801d-275e5ffc04cc (NID) - }#5beb7efe-fd9a-4556-801d-275e5ffc04cc (NID) - |#01443614-cd74-433a-b99e-2ecdc07bfc25 (NID) - }#01443614-cd74-433a-b99e-2ecdc07bfc25 (NID) - |#d3e037e1-3eb8-44c8-a917-57927947596d (NID) - }#d3e037e1-3eb8-44c8-a917-57927947596d (NID) - |#7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c (NID) - }#7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c (NID) - |#92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b (NID) - }#92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b (NID)
rule HackTool_Win32_UACBypass_A_2147776441_0
{
meta:
author = "threatcheck.sh"
detection_name = "HackTool:Win32/UACBypass.A"
threat_id = "2147776441"
type = "HackTool"
platform = "Win32: Windows 32-bit platform"
family = "UACBypass"
severity = "High"
signature_type = "SIGNATURE_TYPE_PEHSTR"
threshold = "3"
strings_accuracy = "High"
strings:
$x_1_1 = "DelegateExecute" wide //weight: 1
$x_1_2 = "Classes\\ms-settings\\shell\\open\\command" wide //weight: 1
$x_1_3 = "UAC_Bypass" wide //weight: 1
condition:
(filesize < 20MB) and
(all of ($x*))
}27147eb56a4cda7125349c3e2973185ed389b28548a8dc5dde404bb84adebd68Immediately quarantine and remove the detected file. Perform a full system scan with updated antivirus software, ensure all Windows updates and security patches are applied, and review system logs for signs of further compromise or unauthorized activity.