Windows HVCI Disabled via Registry Modification
Detection of Hypervisor-protected Code Integrity (HVCI) being disabled by modifying specific Windows registry keys, potentially allowing the execution of malicious kernel-mode code.
This threat brief focuses on the disabling of Hypervisor-protected Code Integrity (HVCI) on Windows systems. HVCI is a critical security feature that protects the kernel and system processes from tampering by malicious code. Attackers may disable HVCI to bypass security controls and execute unsigned kernel-mode code, leading to kernel-level rootkits or other severe security breaches. This activity is detected by monitoring changes to specific Windows registry keys related to HVCI configuration using Sysmon Event ID 13. The activity is associated with the BlackLotus Campaign, which exploits CVE-2022-21894.
Attack Chain
- The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).
- The attacker escalates privileges to gain administrative access, required to modify system-level registry settings.
- The attacker uses a script or executable to modify the registry.
- The script modifies the registry key
HKLM\CurrentControlSet\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity\Enabledto a value of0x00000000. - The system restarts, and HVCI is disabled.
- The attacker deploys and executes unsigned kernel-mode code or a rootkit.
- The malicious code gains persistent control of the system at the kernel level.
- The attacker performs further malicious activities, such as data theft or system compromise.
Impact
Successful disabling of HVCI can lead to a complete compromise of the affected system. Attackers can install kernel-level rootkits, bypass security controls, and execute arbitrary code in the kernel. This can lead to data theft, system instability, and further propagation of malware within the network. The BlackLotus campaign exploits this type of vulnerability to establish persistent, low-level control over compromised systems.
Recommendation
- Enable Sysmon Event ID 13 logging to capture registry modification events.
- Deploy the Sigma rule
Detect HVCI Disable via Registryto your SIEM to detect HVCI being disabled. - Investigate any detected instances of HVCI being disabled, as this can be a sign of malicious activity.
- Ensure systems are patched against CVE-2022-21894 to prevent exploitation.
- Monitor for suspicious processes modifying the registry keys related to HVCI.
- Tune the Sigma rule
Detect HVCI Disable via Registryto filter out legitimate administrative scripts, if necessary.
Detection coverage 2
Detect HVCI Disable via Registry
highDetects disabling of Hypervisor-protected Code Integrity (HVCI) by monitoring changes in the Windows registry.
Detect HVCI Disable via Registry - Process
mediumDetects processes that modify the HVCI-related registry key
Detection queries are kept inside the platform. Get full rules →