HackTool - UACMe Akagi Execution

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects the execution of UACMe, a tool used for UAC bypasses, via default PE metadata

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND (PRODUCT_NAME = "UACMe" OR COMPANY_NAME = "REvol Corp,APT 92,UG North,Hazardous Environments,CD Project Rekt" OR MESSAGE = "UACMe main module,Pentesting utility" OR ORIGINALFILENAME = "Akagi.exe,Akagi64.exe") OR PROCESSNAME endswith "\Akagi64.exe,\Akagi.exe" OR HASHES contains "IMPHASH=767637C23BB42CD5D7397CF58B0BE688,IMPHASH=14C4E4C72BA075E9069EE67F39188AD8,IMPHASH=3C782813D4AFCE07BBFC5A9772ACDBDC,IMPHASH=7D010C6BB6A3726F327F7E239166D127,IMPHASH=89159BA4DD04E4CE5559F132A9964EB3,IMPHASH=6F33F4A5FC42B8CEC7314947BD13F30F,IMPHASH=5834ED4291BDEB928270428EBBAF7604,IMPHASH=5A8A8A43F25485E7EE1B201EDCBC7A38,IMPHASH=DC7D30B90B2D8ABF664FBED2B1B59894,IMPHASH=41923EA1F824FE63EA5BEB84DB7A3E74,IMPHASH=3DE09703C8E79ED2CA3F01074719906B" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Christian Burkard (Nextron Systems), Florian Roth (Nextron Systems)