Windows SmartScreen Disabled via Registry Modification
Attackers disable Windows SmartScreen protection by modifying specific registry keys to evade detection and facilitate malware deployment.
Attackers may attempt to disable Windows SmartScreen to evade detection and deliver malware payloads. Windows SmartScreen provides a warning system against phishing and malware, so disabling it can significantly increase the risk of successful attacks. This is often done by Remote Access Trojans (RATs) to evade detection while downloading additional payloads. The technique involves modifying specific registry keys to turn off the SmartScreen feature. This allows attackers to bypass security measures designed to protect users from malicious software and phishing attempts.
Attack Chain
- Initial Access: The attacker gains initial access to the system through unspecified means, such as exploiting a vulnerability or using stolen credentials.
- Privilege Escalation: The attacker escalates privileges if necessary to gain the required permissions to modify the registry.
- Registry Modification: The attacker modifies the registry keys associated with SmartScreen to disable the protection. This includes setting the
SmartScreenEnabledvalue underHKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\orEnableSmartScreenunderHKLM\Microsoft\Windows\System\to “Off” or “0”. - Persistence: The attacker may establish persistence to ensure that the SmartScreen remains disabled even after a reboot.
- Payload Delivery: With SmartScreen disabled, the attacker downloads and executes malicious payloads, such as malware or RATs, without triggering security warnings.
- Lateral Movement: The attacker may use the compromised system to move laterally within the network, targeting other systems and resources.
- Data Exfiltration: The attacker exfiltrates sensitive data from the compromised system or network.
Impact
Disabling SmartScreen can lead to a significant increase in successful malware infections and phishing attacks. Users are no longer warned about potentially malicious files or websites, making them more vulnerable to exploitation. This can result in data breaches, financial losses, and reputational damage. While specific numbers are unavailable, the impact is potentially widespread across organizations that rely on Windows SmartScreen as a security measure.
Recommendation
- Monitor registry modifications for changes to the
SmartScreenEnabledandEnableSmartScreenregistry keys and values using the provided Sigma rule (SmartScreenDisabledViaRegistry). - Enable Sysmon Event ID 13 to collect registry modification events, which are necessary for the Sigma rule to function (
SmartScreenDisabledViaRegistry). - Investigate any detected instances of SmartScreen being disabled to determine if the activity is malicious.
- Implement strict access controls to prevent unauthorized users from modifying registry settings.
- Regularly review and audit registry settings to ensure that SmartScreen is enabled and functioning correctly.
- Deploy the Sigma rule in this brief to your SIEM and tune for your environment.
Detection coverage 2
SmartScreen Disabled via Registry
highDetects modification of Windows Registry keys to disable SmartScreen protection.
SmartScreen Disabled via Registry (Process)
highDetects a process modifying Windows Registry keys to disable SmartScreen protection.
Detection queries are kept inside the platform. Get full rules →