May 21, 2024, 7:15 a.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

In this article, we’ve prepared a brief overview of UAC bypass methods in Windows 11 that are used in modern malware and provided examples of their implementation in active threats. We’ll cover: 



  • Exploitation of COM interfaces with the Auto-Elevate property 

  • Modification of the ms-settings registry branch 

  • Infinite UAC Prompt Loop (social engineering) 


Let’s investigate these methods. 


Exploitation of COM Interfaces with the Auto-Elevate Property 


First, let’s quickly define COM.  


COM (Component Object Model) refers to objects containing data and methods …

active threats article auto bypass com elevate engineering examples exploitation implementation loop malware modern malware modification prompt property registry settings social social engineering threats uac uac bypass windows windows 11

Information Technology Specialist I: Windows Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, California

Information Technology Specialist I, LACERA: Information Security Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA

Vice President, Controls Design & Development-7

@ State Street | Quincy, Massachusetts

Vice President, Controls Design & Development-5

@ State Street | Quincy, Massachusetts

Data Scientist & AI Prompt Engineer

@ Varonis | Israel

Contractor

@ Birlasoft | INDIA - MUMBAI - BIRLASOFT OFFICE, IN