.. /iscsicpl.exe
Star

UAC bypass (DLL, CMD, GUI)

Microsoft iSCSI Initiator Control Panel tool

Paths:

Resources:

Acknowledgements:

Detections:

UAC bypass

  1. c:\windows\syswow64\iscsicpl.exe has a DLL injection through `C:\Users\<username>\AppData\Local\Microsoft\WindowsApps\ISCSIEXE.dll`, resulting in UAC bypass.

    c:\windows\syswow64\iscsicpl.exe
    Use case
    Execute a custom DLL via a trusted high-integrity process without a UAC prompt.
    Privileges required
    User
    Operating systems
    Windows 10, Windows 11
    ATT&CK® technique
    T1548.002
    Tags
    Execute: DLL
  2. Both `c:\windows\system32\iscsicpl.exe` and `c:\windows\system64\iscsicpl.exe` have UAC bypass through launching iscicpl.exe, then navigating into the Configuration tab, clicking Report, then launching your custom command.

    iscsicpl.exe
    Use case
    Execute a binary or script as a high-integrity process without a UAC prompt.
    Privileges required
    User
    Operating systems
    Windows 10, Windows 11
    ATT&CK® technique
    T1548.002
    Tags
    Execute: CMD
    Application: GUI