<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>IcedID — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/actors/icedid/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/actors/icedid/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Defender MpEngine Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-defender-mpengine/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-defender-mpengine/</guid><description>An attacker modifies the Windows Defender MpEngine registry value to disable key features, potentially allowing malware to evade detection.</description><content:encoded><![CDATA[<p>Attackers, particularly those associated with IcedID campaigns, may attempt to disable Windows Defender to evade detection. This involves modifying the <code>MpEnablePus</code> registry value within the Windows Defender MpEngine settings, specifically setting it to <code>0x00000000</code>. This action effectively disables key features of Windows Defender, creating a window of opportunity for malware to execute undetected. The observed registry modification is a strong indicator of malicious intent, allowing attackers to gain a foothold and further compromise the system. The DFIR Report has documented instances of this technique being used in conjunction with IcedID leading to XingLocker ransomware deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through an unknown method (e.g., phishing, exploit).</li>
<li>The attacker obtains elevated privileges on the compromised system.</li>
<li>The attacker modifies the registry value <code>MpEnablePus</code> to <code>0x00000000</code> under the path <code>HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine</code>.</li>
<li>This registry change disables key Windows Defender features, weakening the endpoint&rsquo;s defenses.</li>
<li>The attacker deploys malware, such as IcedID, which can now operate with reduced interference from the disabled security product.</li>
<li>The malware establishes persistence through various mechanisms (e.g., scheduled tasks, registry run keys).</li>
<li>The attacker performs reconnaissance to identify valuable data and systems within the network.</li>
<li>The attacker moves laterally to other systems, potentially deploying ransomware such as XingLocker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of Windows Defender can lead to widespread malware infection and data compromise. Organizations may experience data breaches, financial losses, and reputational damage. The IcedID malware has been linked to XingLocker ransomware deployment, demonstrating the potential for significant impact following a successful attack. Disabling Windows Defender increases the dwell time of attackers and the likelihood of successful lateral movement and data exfiltration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon EventID 13 to capture registry modifications on endpoints.</li>
<li>Deploy the Sigma rule &ldquo;Detect Defender MpEngine Disabled via Registry Modification&rdquo; to identify suspicious registry changes related to Windows Defender.</li>
<li>Investigate any alerts generated by the Sigma rule, prioritizing systems where other suspicious activities have been observed.</li>
<li>Ensure Sysmon TA version 2.0 or higher is installed for accurate registry monitoring.</li>
<li>Review and harden Windows Defender configuration policies to prevent unauthorized modifications of critical settings.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>defense-evasion</category><category>registry-modification</category><category>windows-defender</category></item><item><title>Suspicious WMIC Application Uninstallation</title><link>https://feed.craftedsignal.io/briefs/2024-01-wmic-uninstallation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wmic-uninstallation/</guid><description>This analytic identifies the use of the WMIC command-line tool to uninstall applications non-interactively, a technique used to evade detection by removing security software, as observed in IcedID campaigns.</description><content:encoded><![CDATA[<p>This detection focuses on the abuse of Windows Management Instrumentation Command-line (WMIC) to uninstall applications in a non-interactive manner. This technique is often employed by threat actors, including IcedID, to disable or remove security software, such as antivirus solutions, in order to evade detection and establish a stronger foothold within a compromised environment. This activity is often seen post-compromise, after initial access has been established, and is used to further the attacker&rsquo;s objectives. The use of the <code>/nointeractive</code> flag is a key indicator of this malicious activity. This behavior is significant because it allows attackers to disable security defenses, facilitating further compromise and persistence within the environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through a phishing campaign or other exploit.</li>
<li>The attacker executes a malicious payload on the victim machine.</li>
<li>The payload establishes persistence and elevates privileges.</li>
<li>WMIC is invoked via <code>wmic.exe</code> with parameters to enumerate installed products.</li>
<li>The attacker uses the <code>product</code> argument with a <code>where name</code> clause to identify target applications.</li>
<li>WMIC is then used with the <code>call uninstall</code> command to remove the target application.</li>
<li>The <code>/nointeractive</code> flag is used to suppress prompts and execute the uninstall silently.</li>
<li>Security software is disabled, allowing for further malicious activity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this attack results in the removal of security software, such as antivirus or endpoint detection and response (EDR) agents, which significantly reduces the victim&rsquo;s ability to detect and respond to the compromise. As seen in the IcedID campaign, this can lead to rapid escalation, such as ransomware deployment within 24 hours. This can affect any Windows environment where WMIC is accessible, potentially impacting organizations of any size.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious WMIC Product Uninstall via CommandLine</code> to detect non-interactive uninstallation attempts.</li>
<li>Investigate any process that spawns <code>wmic.exe</code> with arguments containing <code>product</code>, <code>where name</code>, <code>call uninstall</code>, and <code>/nointeractive</code>, as highlighted in the rule description.</li>
<li>Ensure endpoint detection and response (EDR) agents are configured to log process command-line arguments, which is required for the detection to function correctly.</li>
<li>Review and harden endpoint security policies to restrict the use of WMIC where possible.</li>
<li>Monitor parent processes of <code>wmic.exe</code> to identify potential malicious origins.</li>
<li>Whitelist legitimate uses of <code>wmic.exe</code> for application uninstallation, based on parent process and command line, to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>defense-evasion</category><category>application-uninstall</category><category>wmic</category></item><item><title>Scheduled Task Disablement via Schtasks.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-scheduled-task/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-scheduled-task/</guid><description>Detection of the use of schtasks.exe to disable scheduled tasks, a common tactic used by adversaries like IcedID to disable security applications and evade detection, potentially leading to persistence and further system compromise.</description><content:encoded><![CDATA[<p>Attackers, including malware such as IcedID, frequently disable scheduled tasks as a means of evading detection and maintaining persistence. This technique involves using the <code>schtasks.exe</code> utility with the <code>/change</code> and <code>/disable</code> parameters. By disabling scheduled tasks, adversaries can disrupt security applications, prevent routine system maintenance, and prolong their access to compromised systems. This activity allows attackers to operate undetected, disable critical security defenses, and further compromise the targeted host. The initial report surfaced on October 18, 2021, highlighting the use of this technique in conjunction with the IcedID malware leading to XingLocker ransomware deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of the host via an unspecified method (e.g., phishing, exploit).</li>
<li>The attacker gains initial access and executes code on the target system.</li>
<li>The attacker identifies scheduled tasks to disable, often targeting security applications or system maintenance tasks.</li>
<li>The attacker executes <code>schtasks.exe</code> with the <code>/change</code> parameter to modify the task configuration.</li>
<li>The attacker uses the <code>/disable</code> parameter with <code>schtasks.exe</code> to deactivate the targeted scheduled task. For example: <code>schtasks /change /tn &quot;Security Scan&quot; /disable</code>.</li>
<li>The disabled task no longer runs, allowing the attacker to bypass its functionality.</li>
<li>The attacker maintains persistence and evades detection by preventing security scans and updates.</li>
<li>The attacker proceeds with further malicious activities, such as data theft or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of scheduled tasks can lead to the compromise of critical security defenses. The IcedID malware, for example, has been observed using this technique as a precursor to XingLocker ransomware deployment. This can affect any organization relying on scheduled tasks for security and system maintenance, leading to potential data breaches, system instability, and financial losses. The number of victims can vary depending on the scope of the initial compromise and the effectiveness of the attacker&rsquo;s lateral movement.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Schtasks Disable</code> to your SIEM and tune for your environment to detect schtasks.exe being used to disable tasks.</li>
<li>Enable Sysmon process-creation logging (Event ID 1) and Windows Event Log Security (4688) to activate the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule, prioritizing systems known to host critical applications or data.</li>
<li>Review scheduled task configurations for unexpected changes or disabled tasks.</li>
<li>Implement endpoint detection and response (EDR) solutions that provide visibility into process execution and command-line arguments.</li>
<li>Ensure that all systems have up-to-date security patches and antivirus definitions to prevent initial compromise.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>persistence</category><category>defense_evasion</category><category>windows</category></item></channel></rss>