From b2550124fe00cce88a027e7efb203b332c60ad00 Mon Sep 17 00:00:00 2001 From: Ekitji <41170494+Ekitji@users.noreply.github.com> Date: Sun, 31 Aug 2025 18:09:32 +0200 Subject: [PATCH] iscsicpl.exe UAC bypass (#455) Co-authored-by: Wietze --- yml/OSBinaries/Iscsicpl.yml | 39 +++++++++++++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 yml/OSBinaries/Iscsicpl.yml diff --git a/yml/OSBinaries/Iscsicpl.yml b/yml/OSBinaries/Iscsicpl.yml new file mode 100644 index 0000000..e02b114 --- /dev/null +++ b/yml/OSBinaries/Iscsicpl.yml @@ -0,0 +1,39 @@ +--- +Name: iscsicpl.exe +Description: Microsoft iSCSI Initiator Control Panel tool +Author: Ekitji +Created: 2025-08-17 +Commands: + - Command: c:\windows\syswow64\iscsicpl.exe # SysWOW64 binary + Description: c:\windows\syswow64\iscsicpl.exe has a DLL injection through `C:\Users\\AppData\Local\Microsoft\WindowsApps\ISCSIEXE.dll`, resulting in UAC bypass. + Usecase: Execute a custom DLL via a trusted high-integrity process without a UAC prompt. + Category: UAC Bypass + Privileges: User + MitreID: T1548.002 + OperatingSystem: Windows 10, Windows 11 + Tags: + - Execute: DLL + - Command: iscsicpl.exe # SysWOW64/System32 binary + Description: Both `c:\windows\system32\iscsicpl.exe` and `c:\windows\system64\iscsicpl.exe` have UAC bypass through launching iscicpl.exe, then navigating into the Configuration tab, clicking Report, then launching your custom command. + Usecase: Execute a binary or script as a high-integrity process without a UAC prompt. + Category: UAC Bypass + Privileges: User + MitreID: T1548.002 + OperatingSystem: Windows 10, Windows 11 + Tags: + - Execute: CMD + - Application: GUI +Full_Path: + - Path: c:\windows\system32\iscsicpl.exe # UAC Bypass by breaking out from application + - Path: c:\windows\syswow64\iscsicpl.exe # UAC Bypass by DLL injection and breakout from application +Detection: + - Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/image_load/image_load_uac_bypass_iscsicpl.yml + - IOC: C:\Users\\AppData\Local\Microsoft\WindowsApps\ISCSIEXE.dll + - IOC: Suspicious child process to iscsicpl.exe like cmd, powershell etc. +Resources: + - Link: https://learn.microsoft.com/en-us/windows-server/storage/iscsi/iscsi-initiator-portal + - Link: https://github.com/hackerhouse-opensource/iscsicpl_bypassUAC +Acknowledgement: + - Person: hacker.house + - Person: Ekitji + Handle: '@eki_erk'