Windows Defender SmartScreen Level Downgrade to 'Warn'
This analytic detects modifications to the Windows Registry to set Windows Defender SmartScreen level to 'Warn', which can reduce user suspicion and increase the risk of malware execution.
This detection focuses on identifying attempts to weaken Windows Defender SmartScreen by modifying registry settings. SmartScreen is a security feature designed to protect users from malicious websites and files. Attackers may attempt to lower the protection level to “Warn” from its default settings to reduce user suspicion when running potentially malicious executables. This allows malware to execute with a warning prompt, increasing the chances of successful deployment. This activity is often part of a broader defense evasion strategy employed after initial access has been gained. The detection specifically monitors changes to the ShellSmartScreenLevel registry value.
Attack Chain
- Attacker gains initial access to the system, typically through phishing or exploiting a vulnerability.
- The attacker executes a process with elevated privileges (e.g., via UAC bypass) to modify the registry.
- The process modifies the registry key
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ShellSmartScreenLevelorHKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ShellSmartScreenLevel. - The registry value
ShellSmartScreenLevelis set to “Warn”. - The modified registry setting takes effect, causing SmartScreen to only display a warning when a potentially malicious executable is run.
- The attacker executes a malicious executable that would normally be blocked by SmartScreen.
- SmartScreen displays a warning prompt instead of blocking the execution.
- The user, less suspicious due to the less severe warning, allows the executable to run, leading to system compromise.
Impact
Successful modification of the SmartScreen level can lead to a compromised system. If a user is tricked into running malware due to the less stringent warning, attackers can achieve code execution, persistence, and further lateral movement within the network. This can result in data theft, ransomware deployment, or other malicious activities. While specific victim counts are unavailable, the impact can be significant depending on the targeted environment.
Recommendation
- Enable Sysmon Event ID 13 logging to monitor registry modifications (as per the data_source in the rule).
- Deploy the Sigma rule
Detect SmartScreen Downgrade via Registry Modificationto your SIEM and tune for your environment. - Investigate any detected instances of
ShellSmartScreenLevelbeing set to “Warn” to determine if the activity is malicious. - Block processes attempting to modify the
ShellSmartScreenLevelregistry value using endpoint detection and response (EDR) tools (based on the Registry.registry_path in the rule).
Detection coverage 2
Detect SmartScreen Downgrade via Registry Modification
mediumDetects modifications to the Windows registry that set the Windows Defender SmartScreen level to 'warn'.
Detect Process Modifying SmartScreen Registry Key
lowDetects a process that attempts to modify the Windows Defender SmartScreen registry key.
Detection queries are kept inside the platform. Get full rules →