GitHub - hfiref0x/UACME at v3.2.x (original) (raw)

Build status

UACMe

System Requirements

Usage

Run executable from command line: akagi32 [Key] [Param] or akagi64 [Key] [Param]. See "Run examples" below for more info.

First param is number of method to use, second is optional command (executable file name including full path) to run. Second param can be empty - in this case program will execute elevated cmd.exe from system32 folder.

Keys (watch debug output with dbgview or similar for more info):

  1. Author: Leo Davidson
    • Type: Dll Hijack
    • Method: IFileOperation
    • Target(s): \system32\sysprep\sysprep.exe
    • Component(s): cryptbase.dll
    • Implementation: ucmStandardAutoElevation
    • Works from: Windows 7 (7600)
    • Fixed in: Windows 8.1 (9600)
      * How: sysprep.exe hardened LoadFrom manifest elements
  2. Author: Leo Davidson derivative
    • Type: Dll Hijack
    • Method: IFileOperation
    • Target(s): \system32\sysprep\sysprep.exe
    • Component(s): ShCore.dll
    • Implementation: ucmStandardAutoElevation
    • Works from: Windows 8.1 (9600)
    • Fixed in: Windows 10 TP (> 9600)
      * How: Side effect of ShCore.dll moving to \KnownDlls
  3. Author: Leo Davidson derivative by WinNT/Pitou
    • Type: Dll Hijack
    • Method: IFileOperation
    • Target(s): \system32\oobe\setupsqm.exe
    • Component(s): WdsCore.dll
    • Implementation: ucmStandardAutoElevation
    • Works from: Windows 7 (7600)
    • Fixed in: Windows 10 TH2 (10558)
      * How: Side effect of OOBE redesign
  4. Author: Jon Ericson, WinNT/Gootkit, mzH
    • Type: AppCompat
    • Method: RedirectEXE Shim
    • Target(s): \system32\cliconfg.exe
    • Component(s): -
    • Implementation: ucmShimRedirectEXE
    • Works from: Windows 7 (7600)
    • Fixed in: Windows 10 TP (> 9600)
      * How: Sdbinst.exe autoelevation removed, KB3045645/KB3048097 for rest Windows versions
  5. Author: WinNT/Simda
    • Type: Elevated COM interface
    • Method: ISecurityEditor
    • Target(s): HKLM registry keys
    • Component(s): -
    • Implementation: ucmSimdaTurnOffUac
    • Works from: Windows 7 (7600)
    • Fixed in: Windows 10 TH1 (10147)
      * How: ISecurityEditor interface method changed
  6. Author: Win32/Carberp
    • Type: Dll Hijack
    • Method: WUSA
    • Target(s): \ehome\mcx2prov.exe, \system32\migwiz\migwiz.exe
    • Component(s): WdsCore.dll, CryptBase.dll, CryptSP.dll
    • Implementation: ucmWusaMethod
    • Works from: Windows 7 (7600)
    • Fixed in: Windows 10 TH1 (10147)
      * How: WUSA /extract option removed
  7. Author: Win32/Carberp derivative
    • Type: Dll Hijack
    • Method: WUSA
    • Target(s): \system32\cliconfg.exe
    • Component(s): ntwdblib.dll
    • Implementation: ucmWusaMethod
    • Works from: Windows 7 (7600)
    • Fixed in: Windows 10 TH1 (10147)
      * How: WUSA /extract option removed
  8. Author: Leo Davidson derivative by Win32/Tilon
    • Type: Dll Hijack
    • Method: IFileOperation
    • Target(s): \system32\sysprep\sysprep.exe
    • Component(s): Actionqueue.dll
    • Implementation: ucmStandardAutoElevation
    • Works from: Windows 7 (7600)
    • Fixed in: Windows 8.1 (9600)
      * How: sysprep.exe hardened LoadFrom manifest
  9. Author: Leo Davidson, WinNT/Simda, Win32/Carberp derivative
    • Type: Dll Hijack
    • Method: IFileOperation, ISecurityEditor, WUSA
    • Target(s): IFEO registry keys, \system32\cliconfg.exe
    • Component(s): Attacker defined Application Verifier Dll
    • Implementation: ucmAvrfMethod
    • Works from: Windows 7 (7600)
    • Fixed in: Windows 10 TH1 (10147)
      * How: WUSA /extract option removed, ISecurityEditor interface method changed
  10. Author: WinNT/Pitou, Win32/Carberp derivative
  1. Author: Jon Ericson, WinNT/Gootkit, mzH
  1. Author: Leo Davidson derivative
  1. Author: Leo Davidson derivative
  1. Author: Leo Davidson, WinNT/Sirefef derivative
  1. Author: Leo Davidson, Win32/Addrop, Metasploit derivative
  1. Author: Leo Davidson derivative
  1. Author: Leo Davidson derivative
  1. Author: Leo Davidson derivative
  1. Author: Leo Davidson derivative
  1. Author: Leo Davidson derivative
  1. Author: Leo Davidson derivative
  1. Author: Leo Davidson derivative
  1. Author: Leo Davidson derivative
  1. Author: BreakingMalware
  1. Author: Enigma0x3
  1. Author: Enigma0x3
  1. Author: ExpLife
  1. Author: Exploit/Sandworm
  1. Author: Enigma0x3
  1. Author: Leo Davidson derivative, lhc645
  1. Author: Enigma0x3
  1. Author: xi-tauw
  1. Author: winscripting.blog
  1. Author: James Forshaw
  1. Author: CIA & James Forshaw
  1. Author: Thomas Vanhoutte aka SandboxEscaper
  1. Author: Ernesto Fernandez, Thomas Vanhoutte
  1. Author: Clement Rouault
  1. Author: Stefan Kanthak
  1. Author: Ruben Boonen
  1. Author: Oddvar Moe
  1. Author: BreakingMalware and Enigma0x3
  1. Author: Oddvar Moe derivative
  1. Author: bytecode77
  1. Author: bytecode77
  1. Author: Anonymous
  1. Author: clavoillotte & 3gstudent
  1. Author: deroko
  1. Author: RinN
  1. Author: Anonymous
  1. Author: bytecode77 derivative
  1. Author: David Wells
  1. Author: Emeric Nasi
  1. Author: egre55
  1. Author: James Forshaw
  1. Author: Hashim Jawad
  1. Author: Leo Davidson derivative by Win32/Gapz
  1. Author: RinN
  1. Author: James Forshaw
  1. Author: Enigma0x3 derivative by WinNT/Glupteba
  1. Author: Enigma0x3/bytecode77 derivative by Nassim Asrir
  1. Author: winscripting.blog
  1. Author: Arush Agarampur

Note:

Run examples:

Warning

If you wondering why this still exists and working - here is the explanation - an official Microsoft WHITEFLAG (including totally incompetent statements as bonus)https://blogs.msdn.microsoft.com/oldnewthing/20160816-00/?p=94105

Windows 10 support and testing policy

Protection

Malware usage

Other usage

Build

Compiled Binaries

Instructions

References

Authors

(c) 2014 - 2020 UACMe Project

HitCount