.. /iscsicpl.exe
Star

UAC bypass (DLL, CMD, GUI)

Microsoft iSCSI Initiator Control Panel tool

Paths:

Resources:

Acknowledgements:

Detections:

UAC bypass

  1. c:\windows\syswow64\iscsicpl.exe has a DLL injection through C:\Users\<username>\AppData\Local\Microsoft\WindowsApps\ISCSIEXE.dll, resulting in UAC bypass.

    c:\windows\syswow64\iscsicpl.exe
    Use case

    Execute a custom DLL via a trusted high-integrity process without a UAC prompt.

    Privileges required
    User
    Operating systems
    Windows 10, Windows 11
    ATT&CK® technique
    T1548.002
    Tags
    Execute: DLL
  2. Both c:\windows\system32\iscsicpl.exe and c:\windows\system64\iscsicpl.exe have UAC bypass through launching iscicpl.exe, then navigating into the Configuration tab, clicking Report, then launching your custom command.

    iscsicpl.exe
    Use case

    Execute a binary or script as a high-integrity process without a UAC prompt.

    Privileges required
    User
    Operating systems
    Windows 10, Windows 11
    ATT&CK® technique
    T1548.002
    Tags
    Execute: CMD
    Application: GUI