Skip to content
Threat Feed
medium advisory

Windows Application Hotkey Disablement via Registry Modification

Attackers disable Windows application hotkeys by modifying specific registry entries to hinder incident response and evade detection.

Attackers may disable Windows application hotkeys by modifying specific registry entries. This tactic aims to impair an analyst’s ability to use essential tools like Task Manager and Command Prompt, hindering incident response efforts. The technique leverages registry modifications to disable hotkeys for native applications, complicating remediation and potentially enabling persistence. The activity involves setting the ‘Debugger’ value to “HotKey Disabled” under specific ‘Image File Execution Options’ registry keys.

Attack Chain

  1. The attacker gains initial access to the system through unspecified means.
  2. The attacker escalates privileges to allow registry modifications.
  3. The attacker navigates to the HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options registry key.
  4. The attacker creates or modifies a subkey for a specific executable (e.g., taskmgr.exe, cmd.exe).
  5. The attacker creates or modifies a value named Debugger within the subkey.
  6. The attacker sets the Debugger value to HotKey Disabled, effectively disabling hotkeys for the target application.
  7. The analyst attempts to use hotkeys for incident response and finds them non-functional.
  8. The attacker maintains persistence and complicates incident response efforts.

Impact

Disabling Windows application hotkeys can severely hinder incident response capabilities. By rendering tools like Task Manager and Command Prompt inaccessible via hotkeys, analysts are forced to use alternative, slower methods. This can delay critical tasks such as identifying and terminating malicious processes, giving the attacker more time to operate undetected. The impact can affect any organization relying on standard Windows tools for security monitoring and incident handling.

Recommendation

  • Enable Sysmon EventID 13 logging to detect registry modifications as described in the overview.
  • Deploy the Sigma rule Detect Windows App Hotkey Disablement to your SIEM to identify this specific registry modification.
  • Investigate any alerts generated by the Sigma rule, focusing on the Registry.dest field to identify affected systems.
  • Review systems identified with disabled hotkeys for other signs of compromise based on the registry modifications.

Detection coverage 2

Detect Windows App Hotkey Disablement

medium

Detects suspicious registry modifications aimed at disabling Windows hotkeys for native applications.

sigma tactics: defense_evasion techniques: T1112 sources: registry_set, windows

Detect Windows App Hotkey Disablement (Alternate)

medium

Detects suspicious registry modifications aimed at disabling Windows hotkeys for native applications (Alternate).

sigma tactics: defense_evasion techniques: T1112 sources: registry_set, windows

Detection queries are kept inside the platform. Get full rules →