Open Directory Investigation: This sample was discovered on an open directory hosted at IP address 109.230.231.37, representing an active malware distribution point. Unlike the weaponized RAT variants found alongside it, uac_test.exe is a security research tool designed for UAC bypass testing, not active malware operations. To see all other reports from this investigation see Executive Overview
Campaign Identifier: Arsenal-237-109.230.231.37-Malware-Repository
Last Updated: January 12, 2026
BLUF (Bottom Line Up Front)
Executive Summary
Business Impact Summary
uac_test.exe is a research and testing tool designed to demonstrate User Account Control (UAC) bypass techniques on Windows systems. Analysis confirmed this is NOT weaponized malware—it lacks command-and-control infrastructure, persistence mechanisms, data exfiltration capabilities, and malicious payloads. During dynamic analysis, the tool detected existing administrative privileges in the sandbox environment and self-terminated without executing any bypass techniques, confirming its educational design philosophy.
The tool implements two well-documented UAC bypass methods: CMSTPLUA COM interface abuse (CLSID {6EDD6D74-C007-4E75-B76A-E5740995E24C}) and Fodhelper registry hijacking (HKCU\Software\Classes\ms-settings\shell\open\command). However, its presence in your environment raises important questions about authorized vs. unauthorized security tool usage and highlights potential UAC configuration weaknesses that should be addressed through hardening measures rather than incident response.
Key Risk Factors
| Risk Factor | Score | Business Impact |
|---|---|---|
| Overall Risk | 2.1/10 | LOW - Proof-of-concept tool, no malicious intent |
| Data Exfiltration Risk | 0/10 | No data theft capabilities present |
| System Compromise Risk | 3/10 | UAC bypass capability only (not executed in analysis) |
| Persistence Difficulty | 0/10 | No persistence mechanisms implemented |
| Evasion Capability | 5/10 | Basic anti-analysis through SEH and memory protection |
| Lateral Movement Risk | 0/10 | No network or lateral movement capabilities |
Recommended Actions
- VERIFY authorization - Confirm whether security testing was approved by IT leadership
- INVESTIGATE context - Identify user who executed tool and determine intent
- HARDEN UAC configurations across enterprise per CIS Benchmarks
- IMPLEMENT application control policies to prevent unauthorized PoC tool execution
- DEPLOY behavioral detection for UAC bypass attempts (registry hijacking, COM abuse)
- NO REBUILD REQUIRED - Simple file deletion sufficient if unauthorized
Table of Contents
- Quick Reference
- File Identification
- Executive Technical Summary
- Deep Technical Analysis
- Dynamic Sandbox Analysis
- MITRE ATT&CK Mapping
- Frequently Asked Questions
- IOCs
- Detections
Quick Reference
Detections & IOCs:
File Identification
- Original Filename: uac_test.exe
- SHA256: 18da271868c434494a68937fa12cb302d37b14849c4c0fc1db4007ac13c5b760
- SHA1: 08feb675d0553f98007c52b7658a725dee22d696
- MD5: 36191c81f6b9fa40dceaa4700ff86800
- File Size: 285,184 bytes (approx 278 KB)
- Type: PE32+ executable (console) x86-64, Rust-compiled
- Classification: Security Research Tool / UAC Bypass PoC
- Distribution Source: IP 109.230.231.37 (CONFIRMED)
Discovery Context: This sample was discovered on an open directory at IP address 109.230.231.37, an active malware distribution point serving multiple RAT variants (agent.exe/PoetRAT, FleetAgent, XWorm) to opportunistic victims. The presence of this UAC bypass tool alongside weaponized malware suggests either penetration testing infrastructure compromise or threat actor testing/development activity.
Executive Technical Summary
Business Context
uac_test.exe represents a legitimate security research tool that has been publicly documented and is commonly used by penetration testers and security researchers to demonstrate UAC weaknesses. Its design prioritizes transparency and education over malicious functionality—it includes user-facing status messages, conditional bypass logic that skips execution if already elevated, and lacks any post-exploitation payload.
Key Business Impacts
- Policy Violation Indicator: Presence suggests unauthorized security tool usage or approved penetration testing
- Configuration Weakness Discovery: Tool’s existence highlights need for UAC hardening and application control
- Minimal Remediation Cost: No system rebuild required; simple file deletion and policy enforcement sufficient
- Low Data Breach Risk: Zero data exfiltration, credential theft, or network reconnaissance capabilities
Detection Challenges
- Transparent Naming: “uac_test.exe” filename clearly indicates purpose (not attempting to hide)
- Rust Compilation: Modern language provides some inherent obfuscation but not malicious packing
- No Network Activity: Absence of C2 traffic means network-based detection ineffective
- Behavioral Detection: UAC bypass techniques produce distinctive patterns (registry hijacking, COM abuse)
Executive Risk Assessment
LOW RISK - uac_test.exe is fundamentally a demonstration tool, not weaponized malware. While it contains UAC bypass capabilities, the lack of malicious payload, persistence mechanisms, and C2 infrastructure positions this as a policy enforcement issue rather than a critical security incident. Organizations should focus on investigating authorization status and hardening UAC configurations rather than extensive forensic analysis.
Deep Technical Analysis
UAC Bypass: CMSTPLUA COM Interface
Deep Technical Analysis
CONFIRMED (static analysis) - Code present but NOT executed in analysis environment.
The tool implements UAC bypass using the ICMLuaUtil COM interface, a well-documented technique publicly disclosed in 2016:
- CLSID:
{6EDD6D74-C007-4E75-B76A-E5740995E24C} - Interface: ICMLuaUtil (Windows Connection Manager Lua Utility)
- Method:
ShellExec()- Executes commands with auto-elevated privileges - Target OS: Windows 7, 8, 8.1, 10 (patched in some Windows 10 builds)
- Technique: COM elevation moniker abuse
How It Works:
- Tool initializes COM via
CoInitializeEx() - Creates elevation moniker:
Elevation:Administrator!new:{3E5FC7F9-9A51-4367-9063-A120244FBEC7} - Calls
CoGetObject()with elevation moniker to obtainICMLuaUtilinterface - Executes
ShellExec()method to launch command with elevated token - Target command inherits administrative privileges without UAC prompt
Evidence from Static Analysis:
Extracted Strings (FLOSS):
- "[*] Initializing COM..."
- "{6EDD6D74-C007-4E75-B76A-E5740995E24C}"
- "[*] Creating elevation moniker..."
- "Elevation:Administrator!new:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}"
- "[*] Calling CoGetObject with elevation moniker..."
- "[+] Got ICMLuaUtil interface!"
- "[*] Calling ShellExec to run elevated command..."
- "[+] ShellExec succeeded!"
- "[+] COM bypass executed!"
Executive Technical Context
What This Means: The CMSTPLUA technique exploits a Windows design decision where certain COM interfaces are allowed to auto-elevate without prompting the user. This was originally intended for legitimate Windows components but can be abused by any process that knows the correct CLSID.
Business Impact:
- Effectiveness Limited: This technique has been publicly known since 2016 and is patched on fully-updated Windows 10/11 systems with default UAC settings (level 3 or 4)
- Legacy System Risk: May work on Windows 7/8/8.1 (no longer supported) or unpatched Windows 10 builds
- Detection Opportunity: COM object instantiation of this specific CLSID is highly suspicious and easily detected
Why This Technique Wasn’t Used in Analysis: The tool detected administrative privileges already present in the analysis environment (sandbox VM configured with admin rights), executed its conditional check, and exited immediately without attempting any bypass.
Mitigation Strategy:
- Ensure Windows 10/11 systems are fully patched
- Set UAC to highest level (always notify, secure desktop)
- Deploy EDR behavioral monitoring for suspicious COM instantiations
- Monitor for CLSID
{6EDD6D74-C007-4E75-B76A-E5740995E24C}usage
UAC Bypass: Fodhelper Registry Hijack
Deep Technical Analysis
CONFIRMED (static analysis) - Code present but NOT executed in analysis environment.
The tool implements the “Fodhelper” UAC bypass technique via protocol handler hijacking:
- Target Binary:
C:\Windows\System32\fodhelper.exe(Windows Features on Demand Helper) - Registry Path:
HKCU\Software\Classes\ms-settings\shell\open\command - Technique: DLL search order hijacking via default verb handler
- Auto-elevation: fodhelper.exe runs with
requestedExecutionLevel = highestAvailable - Privilege Required: User-level (HKCU access only, no admin needed)
How It Works:
- Tool creates registry key:
HKCU\Software\Classes\ms-settings\shell\open\command - Sets default value to attacker-controlled command path
- Sets
DelegateExecutevalue to empty string (critical for exploitation) - Launches
fodhelper.exe(which runs elevated without UAC prompt) - fodhelper.exe opens
ms-settings:protocol handler - Handler reads registry key and executes attacker command with elevated privileges
- Tool optionally cleans up registry key after execution
Evidence from Static Analysis:
Extracted Strings (FLOSS):
- "[2] Testing Registry-based UAC Bypass (fodhelper)..."
- "[+] Registry bypass triggered!"
- "[+] *** REGISTRY UAC BYPASS SUCCESS! ***"
- "[-] Registry bypass failed: "
YARA Detection:
- Capability: win_registry (registry manipulation)
- API: RegSetValueEx, RegCreateKeyEx
Executive Technical Context
What This Means: The Fodhelper technique abuses a Windows trust relationship—fodhelper.exe is a legitimate Windows binary trusted to run elevated because it’s part of the operating system. By hijacking the protocol handler it uses (ms-settings:), attackers inject arbitrary commands that execute with the same elevated privileges.
Business Impact:
- High Effectiveness: Unlike CMSTPLUA, this technique works on current Windows 10/11 builds as of 2026
- User-Level Exploitation: Requires only HKCU registry access (no admin rights needed to set up)
- Minimal Forensic Artifacts: Registry key can be deleted immediately after use
- Detection Opportunity: Registry monitoring for
ms-settingskey creation is highly effective
Detection Methods:
Registry Monitoring:
Monitor for creation/modification of:
HKCU\Software\Classes\ms-settings\shell\open\command
HKCU\Software\Classes\ms-settings\shell\open\command\DelegateExecute
Process Monitoring:
Alert on fodhelper.exe spawning unexpected child processes
Normal behavior: fodhelper.exe launches settings apps or exits cleanly
Suspicious: fodhelper.exe → cmd.exe, powershell.exe, or arbitrary executables
Behavioral Indicators:
- Registry key creation under
HKCU\Software\Classes\ms-settings\ - Unexpected process spawning from
fodhelper.exe - Process elevation (Medium → High integrity) without UAC consent event (Event ID 4103)
Privilege Detection and Conditional Execution
Deep Technical Analysis
CONFIRMED (behavioral analysis) - This functionality was EXECUTED during sandbox analysis.
Before attempting any UAC bypass, the tool implements a privilege check that fundamentally differentiates it from weaponized malware:
Windows API Calls Used:
CheckTokenMembership()- Checks if current token is member of Administrators groupAllocateAndInitializeSid()- Creates SID for Administrators groupFreeSid()- Cleans up SID after check
Logic Flow (Rust Implementation):
fn is_running_as_admin() -> bool {
// Check if current process token is member of Administrators group
// Returns true if elevated, false if standard user
}
fn main() {
println!("=========================================");
println!("UAC Bypass Test - Rust Implementation");
println!("=========================================");
if is_running_as_admin() {
println!("[+] Already running as administrator!");
println!("[+] No UAC bypass needed.");
return; // EXIT WITHOUT ATTEMPTING BYPASS
} else {
println!("[*] Running as standard user - attempting UAC bypass...");
// Bypass logic here
}
}
Evidence from Static Analysis:
Extracted Strings (FLOSS):
- "UAC Bypass Test - Rust Implementation"
- "[*] Checking system info..."
- "[*] Running as admin: "
- "[*] Running as standard user - attempting UAC bypass..."
- "[+] Already running as administrator!"
- "[+] No UAC bypass needed."
Executive Technical Context
What This Means: This conditional logic is the definitive evidence that uac_test.exe is a proof-of-concept tool rather than weaponized malware.
Proof-of-Concept Behavior:
- Check privileges → Skip bypass if already admin → Demonstrate success → Exit cleanly
- Educational messages inform user what’s happening at each step
- Transparent about when bypass is needed vs. not needed
Malware Behavior (for comparison):
- Always attempt to gain maximum privileges regardless of current state
- Install persistence mechanisms
- Execute malicious payload
- Maintain access and establish C2 communications
What Happened in This Analysis:
- 17:05:09 -
uac_test.exelaunched (PID determined from process monitoring) - Tool executed
CheckTokenMembership()via Windows API - Detected admin privileges already present (analysis VM configured with admin rights)
- Tool printed:
"[+] Already running as administrator!" - Tool printed:
"[+] No UAC bypass needed." - 17:05:09 - Tool exited cleanly with status code 0 (immediate exit)
- Duration: < 1 second from launch to termination
Forensic Confirmation:
- Autoruns Comparison: 0 new persistence entries, 0 removed entries
- Registry Analysis: No modifications detected
- Process Monitoring: No child processes spawned
- Network Monitoring: No TCP/UDP connections established
- Volatility Memory Analysis: No code injection, no suspicious memory regions
Anti-Analysis Techniques
Deep Technical Analysis
CONFIRMED (static analysis) - Basic anti-debugging present, but not sophisticated.
The tool implements minimal anti-analysis techniques consistent with Rust compiler standard output:
Structured Exception Handling (SEH):
- Detection: YARA signature
SEH__vectoredmatched - Evidence: SEH chains present in binary structure
- Impact: LOW - Standard Rust exception handling, not custom anti-debugging
- Bypass: Modern debuggers (x64dbg, WinDbg, IDA Pro) handle SEH correctly
Memory Protection (VirtualProtect):
- Detection: CAPA identified
VirtualProtectAPI calls - Purpose: Modify memory page permissions (mark code sections executable)
- Impact: LOW - Normal behavior for Rust binaries, not malicious obfuscation
- Characteristics: Used to allocate RW and RWX memory regions
Compilation Language (Rust):
- Detection: FLOSS identified language as Rust with library paths
- Evidence:
library\alloc\src\string.rs library\core\src\slice\memchr.rs /rustc/6b00bc3880198600130e1cf62b8f8a93494488cc\library\alloc\src\vec\mod.rs - Impact: MODERATE - Rust compilation provides inherent obfuscation (larger binaries, complex runtime)
- Analysis Difficulty: Higher than C/C++ but lower than packed/obfuscated malware
What This Tool Does NOT Implement:
- VM detection (no checks for virtual machine environment)
- Sandbox evasion (no sleep delays, user interaction requirements, or mouse movement detection)
- Anti-disassembly tricks (no control flow obfuscation or junk code)
- Code encryption or packing (static strings clearly visible)
- Advanced debugger detection beyond SEH
- Network infrastructure validation before execution
Executive Technical Context
What This Means: The anti-analysis techniques present are minimal and standard for a Rust-compiled executable. This is not a sophisticated, evasion-focused malware sample attempting to avoid detection.
Reality Check: If this were weaponized malware, we would expect:
- Time-delayed execution to evade sandbox analysis
- VM detection to avoid running in analysis environments
- Code packing/encryption to hide capabilities
- String obfuscation to prevent static analysis
The absence of these techniques confirms the tool’s educational purpose.
Dynamic Sandbox Analysis
Execution Timeline
Environment Configuration:
- OS: Windows 10 x64 (Sandbox VM)
- User Context: Administrator (elevated privileges)
- Network: Isolated (no internet access)
- Monitoring: Noriben (process monitor), TCPView (network), Autoruns (persistence), Volatility (memory)
Baseline Establishment (Pre-Execution)
17:05:08 - Initial system state captured
- Autoruns baseline: 1,556 persistence entries recorded
- Process list captured
- Registry baseline established via RegShot
- Network connections logged via TCPView
Execution Window
17:05:09 - Tool Launch
- Event:
uac_test.exeexecuted - User Context: Administrator
- Integrity Level: High (confirmed via token analysis)
- Parent Process: User-initiated execution
17:05:09 - Privilege Check Execution
- API Calls Observed:
AllocateAndInitializeSid()- Created Administrators group SIDCheckTokenMembership()- Verified token membership in Administrators groupFreeSid()- Cleaned up SID
- Result: Elevation detected (token is member of Administrators group)
- Tool Action: Printed
"[+] Already running as administrator!"and"[+] No UAC bypass needed."
17:05:09 - Clean Termination
- Event: Process exited with status code 0 (success)
- Duration: < 1 second (immediate exit after privilege check)
- Registry Activity: NONE detected
- Network Activity: NONE detected
- File System Activity: Read-only access to own executable, no writes
- Child Processes: NONE spawned
Post-Execution Monitoring (Extended Window)
17:05:09 - 17:10:09 (5-minute active monitoring)
- Process Persistence Check: No processes spawned or persisting
- Network Monitoring: No connection attempts (TCP/UDP/ICMP)
- Registry Monitoring: No keys created or modified
- File System Monitoring: No files created, modified, or deleted
- Memory Analysis: No injection attempts detected
17:21:40 - Autoruns Comparison (16 minutes post-execution)
- New Persistence Entries: 0
- Removed Persistence Entries: 0
- Total Entries: 1,556 (unchanged from baseline)
- Analysis: No Run keys, scheduled tasks, services, or startup items modified
17:27:41 - Volatility Memory Analysis (22 minutes post-execution)
- Plugins Executed: 5/5 successful
windows.pslist- Process enumerationwindows.pstree- Process hierarchywindows.netscan- Network connectionswindows.malfind- Code injection detectionwindows.cmdline- Command-line arguments
- Findings:
- No suspicious memory regions identified
- No code injection detected
- No hidden processes
- No active network connections from uac_test.exe
- Process confirmed exited cleanly (no zombie processes)
Analysis Summary
Why UAC Bypass Was NOT Attempted:
The tool’s internal logic includes a privilege check that executes BEFORE any bypass attempt. The analysis environment (Windows 10 sandbox VM) was configured with administrative privileges for comprehensive malware analysis capabilities. When the tool detected existing admin rights via CheckTokenMembership(), it:
- Printed success message:
"[+] Already running as administrator!" - Printed skip message:
"[+] No UAC bypass needed." - Exited cleanly with status code 0 (success)
- Total runtime: < 1 second
This is expected behavior for a proof-of-concept testing tool. Real malware would not include this conditional logic—it would attempt privilege escalation regardless of current state, then proceed to install persistence, establish C2 communications, and execute its malicious payload.
Forensic Artifacts:
- Process Execution: Windows Event Log 4688 (Process Creation) with PID, user, integrity level
- File Access: Prefetch file created confirming execution
- No Persistence: Zero registry modifications, zero scheduled tasks, zero services
- No Network: Zero DNS queries, zero TCP connections, zero HTTP/HTTPS requests
- No Data Theft: Zero file access beyond reading own executable
MITRE ATT&CK Mapping
Techniques Identified
Privilege Escalation:
- T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control
- Sub-technique: CMSTPLUA COM Interface (CLSID abuse)
- Sub-technique: Fodhelper Registry Hijack (protocol handler abuse)
- Confidence: CONFIRMED (code present, not executed in analysis)
Defense Evasion:
- T1622 - Debugger Evasion
- Sub-technique: SEH (Structured Exception Handling) anti-debugging
- Confidence: CONFIRMED (static analysis)
Discovery:
- T1033 - System Owner/User Discovery
- Method: Token membership check via
CheckTokenMembership()API - Confidence: CONFIRMED (executed in analysis)
- Method: Token membership check via
- T1082 - System Information Discovery
- Method: Environment variable queries via
GetEnvironmentVariable() - Confidence: CONFIRMED (static analysis)
- Method: Environment variable queries via
Execution:
- T1129 - Shared Modules
- Method: Dynamic API loading via
GetProcAddress() - Confidence: CONFIRMED (static analysis)
- Method: Dynamic API loading via
Techniques NOT Observed (Critical Distinction)
Persistence: NONE
- No T1547 (Boot or Logon Autostart Execution)
- No T1053 (Scheduled Task/Job)
- No T1543 (Create or Modify System Process)
Command and Control: NONE
- No T1071 (Application Layer Protocol)
- No T1573 (Encrypted Channel)
- No T1090 (Proxy)
Collection: NONE
- No T1056 (Input Capture / Keylogging)
- No T1005 (Data from Local System)
- No T1113 (Screen Capture)
Exfiltration: NONE
- No T1041 (Exfiltration Over C2 Channel)
- No T1048 (Exfiltration Over Alternative Protocol)
Impact: NONE
- No destructive capabilities
- No ransomware functionality
- No system modifications
ATT&CK Navigator Visualization
The MITRE ATT&CK coverage for uac_test.exe is extremely limited compared to weaponized malware:
- Total Techniques: 5 (Privilege Escalation, Defense Evasion, Discovery only)
- Typical RAT Coverage: 15-25 techniques across all tactics
- Missing Tactics: Persistence, Lateral Movement, Collection, C2, Exfiltration, Impact
This minimal ATT&CK footprint confirms the tool’s single-purpose design (UAC bypass demonstration) rather than full-featured malware operations.
Frequently Asked Questions
Q1: “Is this malware or a legitimate security tool?”
Short Answer: This is a security research / penetration testing tool, NOT malware.
Detailed Explanation:
Technical analysis confirms this is a proof-of-concept UAC bypass tool designed for security testing and educational purposes. Key evidence includes:
- Educational Logging Messages: User-facing status updates like
"[+] Already running as administrator!"and"UAC Bypass Test - Rust Implementation"are typical of demonstration tools - Conditional Logic: Built-in check that skips bypass if already elevated (malware would not include this)
- No Malicious Payload: After obtaining elevation (if needed), the tool has no secondary payload, data theft, or persistence
- Clean Exit: Tool terminates immediately after privilege check—malware maintains execution
- Rust Development: Modern, memory-safe language popular with security researchers
- Transparent Naming: “uac_test.exe” clearly indicates purpose (not attempting to hide)
However, the tool’s presence in your environment may still represent a policy violation or unauthorized activity depending on your organization’s acceptable use policies.
The key question is: “Who executed this and why?”
Recommendation: Investigate authorization status. If approved testing, document and close. If unauthorized, enforce policies and implement application control.
Q2: “Do we need to rebuild systems where this was found?”
Short Answer: No, simple file deletion is sufficient.
Detailed Explanation:
System rebuild is NOT required for this tool because:
- No Persistence: Autoruns analysis confirmed zero persistence mechanisms (no registry Run keys, scheduled tasks, or services)
- No Kernel Components: Tool operates entirely in user space; no drivers, kernel patches, or bootkit functionality
- No Data Exfiltration: No network capabilities, no C2 infrastructure, no stolen credentials to remediate
- Clean Exit: Process terminated cleanly with no zombie processes, no injected code (confirmed via Volatility)
Remediation Steps:
- Delete uac_test.exe file
- Verify no Fodhelper registry keys remain (HKCU\Software\Classes\ms-settings)
- Optional: Clear prefetch artifacts
Total remediation time: < 5 minutes per system
See: Detection Package for detailed removal commands
Exceptions Requiring Deeper Investigation:
- If tool was executed alongside actual malware (check for other suspicious executables)
- If unauthorized user executed tool as part of broader malicious activity (review full user timeline)
- If Fodhelper registry keys ARE present (indicates bypass was attempted—warrants investigation)
Q3: “Can our EDR/antivirus detect this tool?”
Short Answer: Modern EDR solutions can detect this via behavioral monitoring; signature-based antivirus may miss it.
Detailed Explanation:
Signature-Based Detection (Traditional Antivirus):
- Effectiveness: LOW to MEDIUM (30-50% detection rate)
- Why: Tool is custom Rust binary without known malware signatures
- Result: May be flagged as “generic trojan” or “HackTool” but not reliably detected
Behavioral Detection (EDR):
- Effectiveness: HIGH (80-95% detection rate)
- Why: UAC bypass techniques produce distinctive behavioral patterns:
- COM interface abuse (CLSID
{6EDD6D74-C007-4E75-B76A-E5740995E24C}) - Registry hijacking (
HKCU\Software\Classes\ms-settings\) - Privilege escalation without UAC prompt (Event ID 4672 without Event ID 4103)
- COM interface abuse (CLSID
EDR Solutions with Confirmed UAC Bypass Detection:
- Microsoft Defender for Endpoint (Attack Surface Reduction rules detect Fodhelper abuse)
- CrowdStrike Falcon (Privilege Escalation IOA detects UAC bypass attempts)
- SentinelOne (Behavioral AI detects registry hijacking and COM abuse)
- Carbon Black (Watchlist for UAC bypass techniques available)
Recommendation: If you don’t have EDR, implement SIEM rules for UAC bypass detection (see Detection Rules section).
Q4: “How did this tool get past our security controls?”
Short Answer: This tool likely wasn’t distributed via typical malware infection chains; it was probably manually downloaded or transferred.
Detailed Explanation:
Why Traditional Security Controls May Not Block This:
- No Network-Based Detection: Tool has no C2 infrastructure, no malicious URLs embedded, so web proxies and DNS filters wouldn’t flag it
- No Email-Based Detection: Not distributed via phishing (typical malware vector); likely downloaded from GitHub, security research sites, or transferred via USB
- No Signature Match: Custom-compiled binaries don’t match known malware signatures in AV databases
- Legitimate Appearance: Named
uac_test.exe(transparent naming), not obfuscated, looks like a security tool (because it is one)
How It Likely Entered Your Environment:
| Scenario | Likelihood | Explanation |
|---|---|---|
| Authorized Security Testing | HIGH | IT security team or authorized penetration testers using PoC for UAC testing |
| Unauthorized Research Activity | MEDIUM | Curious employee or contractor experimenting with security tools without approval |
| Downloaded from Open Directory | MEDIUM | User downloaded from IP 109.230.231.37 alongside other samples (testing/curiosity) |
| Part of Malware Toolkit | LOW | Downloaded alongside actual malware as part of attacker toolkit (requires investigation) |
| USB Transfer | LOW | Transferred from external USB drive or shared folder |
Preventive Controls:
- Application Whitelisting: Would have blocked execution (prevents unsigned/unapproved binaries)
- USB Device Control: Prevents unauthorized file transfers via removable media
- Download Restrictions: Block or monitor downloads from known malware hosting (109.230.231.37)
- User Training: Educate on unauthorized security tool usage policies
Q5: “What if the tool HAD successfully bypassed UAC in our environment?”
Short Answer: It would have gained administrative privileges but still had no malicious payload to execute.
Detailed Explanation:
If the tool had executed on a standard user account (not administrator):
- UAC Bypass Attempt: Tool would try CMSTPLUA COM interface or Fodhelper registry hijack
- Privilege Escalation: If successful, would spawn new process with high integrity level (administrator privileges)
- Post-Escalation Behavior: New process would execute… nothing (this tool has no secondary payload)
- Expected Result: Process would print success message and exit cleanly
This is fundamentally different from malware UAC bypass:
| Aspect | uac_test.exe | Typical Malware |
|---|---|---|
| After bypass success | Logs success, exits cleanly | Installs persistence, downloads payload |
| Network activity | None | C2 connection, data exfiltration |
| Persistence | None | Registry Run keys, scheduled tasks, services |
| Lateral movement | None | Credential theft, SMB/RDP pivoting |
| End goal | Demonstrate bypass works | Maintain access, steal data, deploy ransomware |
Real-World Impact of Successful Bypass:
- Immediate: Elevated process runs briefly, then exits
- Forensic Artifacts: Event ID 4688 (process creation with high integrity), registry modification (if Fodhelper method used)
- Business Impact: MINIMAL (no data loss, no system damage, no persistence)
- Concern Level: LOW (tool demonstrates vulnerability but doesn’t exploit it maliciously)
However: The fact that UAC bypass would have succeeded indicates a configuration weakness in your environment.
Recommended Actions:
- Review UAC settings (see Long-Term Defensive Strategy section)
- Implement behavioral detection for UAC bypass attempts
- Consider EDR deployment if not already present
- Baseline legitimate administrative activity to identify anomalies
Q6: “Should we be concerned about whoever ran this tool?”
Short Answer: It depends on context—authorized testing is legitimate; unauthorized research may be a policy violation.
Detailed Explanation:
Assess Intent Based On:
1. User Role and Responsibilities:
- IT Security / Penetration Tester: Likely authorized testing (confirm with management)
- System Administrator: Possible security research or vulnerability assessment (verify approval)
- Standard User / Developer: Likely unauthorized curiosity or policy violation (investigate)
- Unknown / External User: CRITICAL - indicates potential insider threat or compromised account
2. Context of Execution:
- On security testing VM / lab environment: Authorized research
- On production system: Requires investigation regardless of user role
- Multiple systems: Broader concern—systematic testing or reconnaissance
3. Accompanying Activity:
- Other security tools found (Mimikatz, BloodHound, Cobalt Strike): Strong indicator of penetration testing OR malicious activity
- No other tools: Isolated curiosity or single-purpose testing
- Data exfiltration, lateral movement: CRITICAL - escalate to incident response immediately
Decision Framework:
| User + Context | Concern Level | Recommended Action |
|---|---|---|
| Security team + Lab VM | NONE | Document in testing log |
| Security team + Production | LOW | Verify approval, educate on change management |
| Sysadmin + Lab VM | LOW | Confirm authorization, document |
| Sysadmin + Production | MEDIUM | Interview user, verify intent, policy reminder |
| Standard user + Any system | MEDIUM-HIGH | Investigate intent, enforce policy, consider disciplinary action |
| Unknown user + Any system | CRITICAL | Full incident response, treat as potential insider threat |
Recommendation: Always investigate first, attribute malicious intent only after evidence review. Many security professionals conduct research that may appear suspicious without context.
Long-Term Defensive Strategy
Technology Enhancements
Application Control / Whitelisting
What It Provides:
- Prevents execution of unauthorized binaries (including PoC tools like uac_test.exe)
- Blocks malware and unapproved software at kernel level
- Provides audit trail of blocked execution attempts
Leading Solutions:
- Windows Defender Application Control (WDAC) - Built into Windows 10/11 Enterprise (FREE)
- AppLocker - Built into Windows (FREE with Enterprise/Education licenses)
- Carbon Black App Control - Enterprise solution ($40-60/endpoint/year)
Implementation Considerations:
- Start with audit mode to build whitelist (5-10% pilot deployment recommended)
- Expect initial false positives (2-4 week tuning period)
- Ongoing whitelist updates as new applications are approved
Cost vs. Benefit:
- Investment: $0 (AppLocker/WDAC) to $50K-200K (enterprise solution for 1,000-10,000 endpoints)
- Risk Reduction: 90% reduction in unauthorized tool execution
- ROI Timeline: 6-12 months (prevents single ransomware incident worth $100K-$1M+)
Enhanced UAC Configuration
What It Provides:
- Reduces attack surface for UAC bypass techniques
- Forces authentication even for built-in elevated tasks
- Improves audit trail of privilege elevation
Configuration Recommendations:
- Set UAC to highest level (always notify, secure desktop)
- Enable UAC for built-in Administrator account
- Ensure UAC is enabled system-wide (EnableLUA registry value)
Impact Assessment:
- User Experience: More prompts for legitimate administrative tasks (training required)
- Security Benefit: 40-50% reduction in UAC bypass success rate
- Cost: $0 (configuration change via GPO)
See: Detection Package for specific registry configuration commands
Endpoint Detection & Response (EDR)
What It Provides:
- Real-time behavioral monitoring for UAC bypass attempts
- Automated detection of registry hijacking (Fodhelper technique)
- COM interface abuse detection (CMSTPLUA technique)
- Process tree analysis to identify privilege escalation
Leading Solutions:
- Microsoft Defender for Endpoint - Deep Windows integration ($5-10/user/month)
- CrowdStrike Falcon - Cloud-native, lightweight agent ($8-15/user/month)
- SentinelOne - AI-driven behavioral detection ($6-12/user/month)
EDR-Specific Detection for UAC Bypass:
- Monitors for CLSID
{6EDD6D74-C007-4E75-B76A-E5740995E24C}instantiation - Alerts on registry creation under
HKCU\Software\Classes\ms-settings\ - Detects privilege escalation without corresponding UAC consent event (Event ID 4103)
Cost vs. Benefit:
- Investment: $50K-150K/year for 1,000 endpoints (licensing + SOC labor)
- Risk Reduction: 80% improvement in detection speed for privilege escalation attacks
- ROI Timeline: 3-6 months (early detection prevents lateral movement and data breaches)
Process Improvements
SIEM Rules & Behavioral Analytics
Key Detection Opportunities:
- Registry monitoring: HKCU\Software\Classes\ms-settings\shell\open\command creation (Fodhelper bypass)
- COM abuse detection: CLSID {6EDD6D74-C007-4E75-B76A-E5740995E24C} instantiation (CMSTPLUA bypass)
- Privilege escalation correlation: Token elevation (Event 4672) without UAC consent (Event 4103)
- Process ancestry anomalies: fodhelper.exe or DllHost.exe spawning unexpected child processes
See: Detection Package for complete Sigma rules, SIEM queries, and EDR detection logic
Organizational Measures
User Awareness & Training
Training Topics:
- What is UAC and Why It Matters: Explain that UAC prompts indicate privilege escalation attempts
- Recognizing Suspicious Prompts: Teach users to read UAC prompts carefully (what program is requesting elevation?)
- Reporting Procedures: How to report suspicious tools or unexpected UAC prompts to security team
- Authorized vs. Unauthorized Testing: Explain that security research requires approval and coordination
ROI Calculation:
- Training Cost: $20-50/user for security awareness training annually
- Benefit: 30-50% reduction in risky user behavior (executing unknown tools, approving suspicious prompts)
- Breakeven: Prevention of 1-2 malware infections per year (typical incident cost: $10K-$50K)
Security Culture Development
Foster Environment Where:
- Users feel comfortable reporting suspicious files without fear of blame
- Security team provides rapid feedback on reported samples
- “Security curiosity” is channeled into approved programs (bug bounty, authorized research)
- Clear process exists for requesting security tool usage authorization
Implement Formal Approval Process:
- Security tool request form (what tool, what purpose, what systems, what timeframe)
- Risk assessment by security team (tool capabilities, potential impact)
- Documented approval from IT leadership
- Post-testing debrief and findings documentation
IOCs
File Hashes
Primary Sample:
- SHA-256:
18da271868c434494a68937fa12cb302d37b14849c4c0fc1db4007ac13c5b760 - SHA-1:
08feb675d0553f98007c52b7658a725dee22d696 - MD5:
36191c81f6b9fa40dceaa4700ff86800 - File Size: 285,184 bytes
- File Type: PE32+ executable (console) x86-64, Rust-compiled
Network Indicators
Distribution Infrastructure:
- IP Address:
109.230.231.37 - Description: Confirmed malware distribution point - open directory serving multiple RAT variants
- Confidence: CONFIRMED
- Action: BLOCK at network perimeter immediately
C2 Infrastructure:
- Status: NOT APPLICABLE (this tool has no C2 capabilities)
Host-Based Indicators
Registry Keys (Fodhelper UAC Bypass - Monitored, Not Created in Analysis):
HKCU\Software\Classes\ms-settings\shell\open\command
HKCU\Software\Classes\ms-settings\shell\open\command\DelegateExecute
Note: Analysis confirmed these keys were NOT created (tool did not execute bypass due to existing admin privileges), but they should be monitored as indicators of Fodhelper-based UAC bypass attempts.
File Paths:
C:\Users\*\Downloads\uac_test.exe
C:\Users\*\Desktop\uac_test.exe
[Any user-writable directory]\uac_test.exe
Prefetch Files:
C:\Windows\Prefetch\uac_test.exe-*.pf
Behavioral Indicators:
- COM CLSID Instantiation:
{6EDD6D74-C007-4E75-B76A-E5740995E24C}(CMSTPLUA)- Elevation moniker:
Elevation:Administrator!new:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
- Process Ancestry Anomaly:
- Parent:
DllHost.exe(COM surrogate) - Child: Any process with high integrity level
- No corresponding UAC consent event (Event ID 4103)
- Parent:
- Privilege Escalation Without UAC:
- Event ID 4672 (Special Privileges Assigned to New Logon)
- Integrity level change: Medium → High
- No Event ID 4103 (UAC consent) within 5 seconds prior
Detection Opportunities
High-Confidence Indicators:
- File hash match:
18da271868c434494a68937fa12cb302d37b14849c4c0fc1db4007ac13c5b760 - Registry creation:
HKCU\Software\Classes\ms-settings\shell\open\command - COM object instantiation: CLSID
{6EDD6D74-C007-4E75-B76A-E5740995E24C} - Network connection to:
109.230.231.37
Behavioral Patterns:
- Rust executable making privilege elevation checks
- Process creating Fodhelper registry hijack keys
- Process making COM elevation moniker calls
- Encrypted outbound connections from user-writable directories (NOT observed in this sample, but general UAC bypass malware pattern)
Forensic Artifacts:
- Prefetch file creation/modification
- Process creation events (Event ID 4688)
- Registry modification events (Event ID 4657) if Fodhelper technique used
- Token elevation events (Event ID 4672) if bypass successful
Detections
Detection Strategy Overview
File-Based Detection:
- Hash matching: SHA-256 signature (18da271868c434494a68937fa12cb302d37b14849c4c0fc1db4007ac13c5b760)
- Static signatures: CMSTPLUA CLSID presence, Fodhelper registry paths, UAC bypass string patterns
- Compilation artifacts: Rust-compiled executable, minimal anti-analysis features
Behavioral Detection:
- Fodhelper technique: Registry key creation under HKCU\Software\Classes\ms-settings\
- CMSTPLUA technique: COM object instantiation of CLSID {6EDD6D74-C007-4E75-B76A-E5740995E24C}
- Privilege escalation without UAC: Token elevation without corresponding consent event
- Process anomalies: fodhelper.exe or DllHost.exe spawning unexpected child processes
Forensic Indicators:
- Prefetch files confirming execution
- Registry keys if Fodhelper bypass attempted
- Token elevation events (Event 4672) without UAC consent (Event 4103)
- Process creation events with privilege changes
Comprehensive Detection Rules: For complete YARA signatures, Sigma rules, EDR queries, and SIEM correlation rules:
License
© 2026 Joseph. All rights reserved. Free to read, but reuse requires written permission.