mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-12-27 23:37:58 +01:00
ebbf08ec4d
* Adding various tags as a first iteration * Adding quotes * Adding 'Custom Format' properly * Updating to key:value pairs * Update template
49 lines
3.1 KiB
YAML
49 lines
3.1 KiB
YAML
---
|
|
Name: Eventvwr.exe
|
|
Description: Displays Windows Event Logs in a GUI window.
|
|
Author: 'Jacob Gajek'
|
|
Created: 2018-11-01
|
|
Commands:
|
|
- Command: eventvwr.exe
|
|
Description: During startup, eventvwr.exe checks the registry value HKCU\Software\Classes\mscfile\shell\open\command for the location of mmc.exe, which is used to open the eventvwr.msc saved console file. If the location of another binary or script is added to this registry value, it will be executed as a high-integrity process without a UAC prompt being displayed to the user.
|
|
Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
|
|
Category: UAC Bypass
|
|
Privileges: User
|
|
MitreID: T1548.002
|
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
|
Tags:
|
|
- Application: GUI
|
|
- Command: ysoserial.exe -o raw -f BinaryFormatter - g DataSet -c calc > RecentViews & copy RecentViews %LOCALAPPDATA%\Microsoft\EventV~1\RecentViews & eventvwr.exe
|
|
Description: During startup, eventvwr.exe uses .NET deserialization with %LOCALAPPDATA%\Microsoft\EventV~1\RecentViews file. This file can be created using https://github.com/pwntester/ysoserial.net
|
|
Usecase: Execute a command to bypass security restrictions that limit the use of command-line interpreters.
|
|
Category: UAC Bypass
|
|
Privileges: Administrator
|
|
MitreID: T1548.002
|
|
OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10
|
|
Tags:
|
|
- Application: GUI
|
|
Full_Path:
|
|
- Path: C:\Windows\System32\eventvwr.exe
|
|
- Path: C:\Windows\SysWOW64\eventvwr.exe
|
|
Code_Sample:
|
|
- Code: https://github.com/enigma0x3/Misc-PowerShell-Stuff/blob/master/Invoke-EventVwrBypass.ps1
|
|
Detection:
|
|
- Sigma: https://github.com/SigmaHQ/sigma/blob/62d4fd26b05f4d81973e7c8e80d7c1a0c6a29d0e/rules/windows/process_creation/proc_creation_win_uac_bypass_eventvwr.yml
|
|
- Sigma: https://github.com/SigmaHQ/sigma/blob/62d4fd26b05f4d81973e7c8e80d7c1a0c6a29d0e/rules/windows/registry/registry_set/registry_set_uac_bypass_eventvwr.yml
|
|
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/file/file_event/file_event_win_uac_bypass_eventvwr.yml
|
|
- Elastic: https://github.com/elastic/detection-rules/blob/d31ea6253ea40789b1fc49ade79b7ec92154d12a/rules/windows/privilege_escalation_uac_bypass_event_viewer.toml
|
|
- Splunk: https://github.com/splunk/security_content/blob/86a5b644a44240f01274c8b74d19a435c7dae66e/detections/endpoint/eventvwr_uac_bypass.yml
|
|
- IOC: eventvwr.exe launching child process other than mmc.exe
|
|
- IOC: Creation or modification of the registry value HKCU\Software\Classes\mscfile\shell\open\command
|
|
Resources:
|
|
- Link: https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/
|
|
- Link: https://github.com/enigma0x3/Misc-PowerShell-Stuff/blob/master/Invoke-EventVwrBypass.ps1
|
|
- Link: https://twitter.com/orange_8361/status/1518970259868626944
|
|
Acknowledgement:
|
|
- Person: Matt Nelson
|
|
Handle: '@enigma0x3'
|
|
- Person: Matt Graeber
|
|
Handle: '@mattifestation'
|
|
- Person: Orange Tsai
|
|
Handle: '@orange_8361'
|