2019-03-18 08:44:53 +01:00
---
Name : Wsreset.exe
Description : Used to reset Windows Store settings according to its manifest file
Author : 'Oddvar Moe'
2021-01-10 16:04:52 +01:00
Created : 2019-03-18
2019-03-18 08:44:53 +01:00
Commands :
- Command : wsreset.exe
2021-01-10 16:04:52 +01:00
Description : During startup, wsreset.exe checks the registry value HKCU\Software\Classes\AppX82a6gwre4fdg3bt635tn5ctqjf8msdd2\Shell\open\command for the command to run. Binary will be executed as a high-integrity process without a UAC prompt being displayed to the user.
Usecase : Execute a binary or script as a high-integrity process without a UAC prompt.
2019-03-18 08:44:53 +01:00
Category : UAC bypass
Privileges : User
MitreID : T1088
MitreLink : https://attack.mitre.org/wiki/Technique/T1088
OperatingSystem : Windows 10
Full_Path :
- Path : C:\Windows\System32\wsreset.exe
2021-01-10 16:49:30 +01:00
Code_Sample :
2021-01-10 16:04:52 +01:00
- Code :
2019-03-18 08:44:53 +01:00
Detection :
- IOC : wsreset.exe launching child process other than mmc.exe
- IOC : Creation or modification of the registry value HKCU\Software\Classes\AppX82a6gwre4fdg3bt635tn5ctqjf8msdd2\Shell\open\command
2021-01-20 14:47:23 +01:00
- IOC : Microsoft Defender Antivirus as Behavior:Win32/UACBypassExp.T!gen
2019-03-18 08:44:53 +01:00
Resources :
- Link : https://www.activecyber.us/activelabs/windows-uac-bypass
- Link : https://twitter.com/ihack4falafel/status/1106644790114947073
- Link : https://github.com/hfiref0x/UACME/blob/master/README.md
Acknowledgement :
- Person : Hashim Jawad
Handle : '@ihack4falafel'
---