sigma |
proc_creation_win_high_integrity_sdclt.yml |
title: High Integrity Sdclt Process |
DRL 1.0 |
sigma |
proc_creation_win_high_integrity_sdclt.yml |
description: A General detection for sdclt being spawned as an elevated process. This could be an indicator of sdclt being used for bypass UAC techniques. |
DRL 1.0 |
sigma |
proc_creation_win_high_integrity_sdclt.yml |
Image\|endswith: 'sdclt.exe' |
DRL 1.0 |
sigma |
proc_creation_win_sdclt_child_process.yml |
title: Sdclt Child Processes |
DRL 1.0 |
sigma |
proc_creation_win_sdclt_child_process.yml |
description: A General detection for sdclt spawning new processes. This could be an indicator of sdclt being used for bypass UAC techniques. |
DRL 1.0 |
sigma |
proc_creation_win_sdclt_child_process.yml |
ParentImage\|endswith: '\sdclt.exe' |
DRL 1.0 |
sigma |
registry_event_bypass_uac_using_delegateexecute.yml |
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1548.002/T1548.002.md#atomic-test-7---bypass-uac-using-sdclt-delegateexecute |
DRL 1.0 |
sigma |
registry_event_comhijack_sdclt.yml |
title: COM Hijack via Sdclt |
DRL 1.0 |
sigma |
registry_event_comhijack_sdclt.yml |
- http://blog.sevagas.com/?Yet-another-sdclt-UAC-bypass |
DRL 1.0 |
sigma |
registry_event_uac_bypass_sdclt.yml |
title: UAC Bypass via Sdclt |
DRL 1.0 |
sigma |
registry_event_uac_bypass_sdclt.yml |
description: Detects the pattern of UAC Bypass using registry key manipulation of sdclt.exe (e.g. UACMe 53) |
DRL 1.0 |
sigma |
registry_event_uac_bypass_sdclt.yml |
- https://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe/ |
DRL 1.0 |
malware-ioc |
misp_invisimole.json |
"https://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe/" |
© ESET 2014-2018 |
atomic-red-team |
index.md |
- Atomic Test #7: Bypass UAC using sdclt DelegateExecute [windows] |
MIT License. © 2018 Red Canary |
atomic-red-team |
windows-index.md |
- Atomic Test #7: Bypass UAC using sdclt DelegateExecute [windows] |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1548.002.md |
- Atomic Test #7 - Bypass UAC using sdclt DelegateExecute |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1548.002.md |
## Atomic Test #7 - Bypass UAC using sdclt DelegateExecute |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1548.002.md |
Upon successful execution, sdclt.exe will spawn cmd.exe to spawn notepad.exe |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1548.002.md |
Reference - sevagas.com |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1548.002.md |
Start-Process -FilePath $env:windir\system32\sdclt.exe |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1548.002.md |
Target: \system32\sdclt.exe |
MIT License. © 2018 Red Canary |