Bypass UAC Using DLL Hijacking

This tutorial was written with Windows 7 in mind, but the principle applies to all versions starting from 7.

User Account Control (UAC)
Processes in Windows run at different levels of integrity, representing the different amounts of “trust” they have to interact with the computer. The levels are as follows:

System – System level of integrity
Administrator – High level
Authenticated User – Medium level
Everyone – Low level
Anonymous – Untrusted
If User Account Control is enabled, programs run at medium (Or lower) integrity, even if the user starting them has Administrator rights. This limits damage malware can do to the computer, as it can only interact with user files. When a program needs to run on a higher integrity level, it has to prompt the user to give it admin rights.

UAC has 4 different levels:

Always notify: User is notified any time anything needs elevated privileges.
Notify me only when programs try to make changes to my computer: User is prompted when a program needs elevated privileges
Notify me only when programs try to make changes to my computer (Don’t dim the desktop): Doesn’t dim the desktop when showing a prompt. Less secure than above level.
Never notify: User is never notified about changes to the computer.

If a user is an administrator, they can press “Yes” to give the asking process higher integrity, or, if they are not an admin, they have to type in the administrator password.

Our goal here is to get a process to start with high integrity without interacting with the user. This technique will work only if they are an administrator, and UAC is not at “Always notify” level.
DLL Hijacking
DLL hijacking is a technique used to force programs to load malicious DLLs. A program normally should search for DLLs like this:

0.1 If DLL is already loaded, use it.
0.2 If DLL is on the list of known DLLs, stored in registry, load it from the path on the list.

Hardcoded path
System directory
16 bit system directory
Windows directory
Current directory
PATH environment variable
However, some programs look into the current directory first, allowing us to hijack the search and make it load our DLL.

For a program to be able to elevate without user consent it has to:

Be signed with a certificate from Microsoft.
Be in a secure directory.
Have the “AutoElevate” property in it’s manifest.
A program which meets those conditions can elevate without a prompt on the default settings.

Bypassing UAC
To recap, these are the conditions that allow bypassing UAC:

Executable must be vulnerable to DLL hijacking.
Executable must have the ability to auto-elevate.
We have to be running a medium integrity process.
User must be in the administrators group.
UAC settings must be left on default values, or lower.
If all of these are fulfilled, the process of bypassing UAC is as follows:

Copy our malicious DLL to a vulnerable program’s directory.
Execute the program, so it loads our malicious DLL.
The first step might seem impossible, seeing as we need to have admin privileges to copy files to protected locations, such as C:\Windows\System32. But quite conveniently, we can use the Windows Update Standalone Installer (wusa.exe) to unpack cabinet files into secure directories. That is possible because wusa can elevate to administrator without prompting the user.
The program we will be exploiting is called Mcx2Prov.exe. It is located in C:\Windows\ehome, and the malicious library needs to be called cryptbase.dll.

Steps to Bypass UAC:
Create our malicious DLL. We can write one ourselves, or use msfvenom. The DLL I am going to load will open Command Prompt. (Make sure the DLL has the correct bitness, and use x64 versions of payloads if needed. Use the command “systeminfo” to see system bitness.)
Syntax: msfvenom -p <payload> -f dll -o cryptbase.dll <payload options>

Turn our DLL into a cabinet file. There is a tool on windows called makecab which will create the file for us.
Syntax: makecab <input file> <output file>

Unpack the cabinet using wusa:
Syntax: wusa <input file> /extract:C:\Windows\ehome\

Be careful to use the absolute path to the cabinet file. You won’t get an error if extracting fails, so double check everything worked correctly.

Run Mcx2Prov.exe:

Pwned! There is another way to copy files, using code injection, and vulnerable executables vary by Windows version. Nevertheless, this exploit is quite reliable and easy to execute.

Additional Info:
Here are exploitable programs available:
On Windows 7:

On Windows 8:

On Windows 8.1:

C:\windows\System32\pwcreator.exe -> vds.exe
C:\Program Files\Common Files\microsoft shared\ink\CRYPTBASE.dll
C:\Program Files\Common Files\microsoft shared\ink\CRYPTSP.dll
C:\Program Files\Common Files\microsoft shared\ink\dwmapi.dll
C:\Program Files\Common Files\microsoft shared\ink\USERENV.dll
C:\Program Files\Common Files\microsoft shared\ink\OLEACC.dll
Do not unnecessarily give users admin rights.
Set UAC to Always Notify (Extremely annoying).


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s