Bypass User Account Control (T1548.002)

View on ATT&CK

In Playbook

Associated Tactics

  • Privilege Escalation
  • Defense Evasion

Privilege Escalation (TA0004)

The adversary is trying to gain higher-level permissions. Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their objectives. Common approaches are to take advantage of system weaknesses, misconfigurations, and vulnerabilities. Examples of elevated access include: * SYSTEM/root level * local administrator * user account with admin-like access * user accounts with access to specific system or perform specific function These techniques often overlap with Persistence techniques, as OS features that let an adversary persist can execute in an elevated context.

View on ATT&CK

Procedure Examples

Description Source(s)
Davidson, L. (n.d.). Windows 7 UAC whitelist. Retrieved November 12, 2014. Davidson Windows
Lich, B. (2016, May 31). How User Account Control Works. Retrieved June 3, 2016. TechNet How UAC Works
Medin, T. (2013, August 8). PsExec UAC Bypass. Retrieved June 3, 2016. SANS UAC Bypass
Microsoft. (n.d.). The COM Elevation Moniker. Retrieved July 26, 2016. MSDN COM Elevation
Nelson, M. (2016, August 15). "Fileless" UAC Bypass using eventvwr.exe and Registry Hijacking. Retrieved December 27, 2016. enigma0x3 Fileless UAC Bypass
Nelson, M. (2017, March 14). Bypassing UAC using App Paths. Retrieved May 25, 2017. enigma0x3 sdclt app paths
Nelson, M. (2017, March 17). "Fileless" UAC Bypass Using sdclt.exe. Retrieved May 25, 2017. enigma0x3 sdclt bypass
Russinovich, M. (2009, July). User Account Control: Inside Windows 7 User Account Control. Retrieved July 26, 2016. TechNet Inside UAC
Salvio, J., Joven, R. (2016, December 16). Malicious Macro Bypasses UAC to Elevate Privilege for Fareit Malware. Retrieved December 27, 2016. Fortinet Fareit
UACME Project. (2016, June 16). UACMe. Retrieved July 26, 2016. Github UACMe