Outlook Dialogs Disabled by Unusual Process
The detection identifies the modification of the Windows Registry key 'PONT_STRING' under Outlook Options by a process other than Outlook.exe, potentially indicating malware activity such as NotDoor.
This threat brief addresses a technique where a process other than Outlook modifies the PONT_STRING registry value within Outlook’s options. This modification disables certain dialog popups within Outlook, which can allow malicious scripts or actions to execute without user consent or notification. The activity is associated with malware families such as NotDoor. Attackers may leverage this to harvest email information or bypass security warnings. The technique involves modifying the Windows Registry key HKEY_CURRENT_USER\Software\Microsoft\Office\<version>\Outlook\Options\General\PONT_STRING.
Attack Chain
- An attacker gains initial access to the system (e.g., through phishing or exploiting a software vulnerability).
- The attacker executes a malicious program or script (e.g., PowerShell or VBScript).
- The malicious program identifies the Outlook installation and its corresponding registry path.
- The malicious program modifies the
PONT_STRINGvalue under theHKEY_CURRENT_USER\Software\Microsoft\Office\<version>\Outlook\Options\General\key. - This modification disables Outlook’s dialog popups.
- The attacker executes further malicious actions, such as harvesting email credentials or injecting malicious content into emails, without user prompts.
- Exfiltrate data.
Impact
Successful exploitation allows attackers to bypass security warnings and execute malicious code within the context of Microsoft Outlook. This can lead to unauthorized access to sensitive email data, credential theft, and the deployment of further malware. While the number of affected organizations is currently unknown, any organization using Microsoft Outlook is potentially at risk. Disabling Outlook dialogs is a common tactic used by malware families like NotDoor to facilitate data exfiltration.
Recommendation
- Enable Sysmon Event ID 13 (Registry events) to monitor registry modifications, as indicated in the rule’s
data_source. - Deploy the Sigma rule
Outlook Dialogs Disabled by Non-Outlook Processto detect this specific registry modification. Tune the rule using the filter macro as described in the original source. - Investigate any registry modifications to the
HKEY_CURRENT_USER\Software\Microsoft\Office\<version>\Outlook\Options\General\PONT_STRINGkey by processes other thanOutlook.exe. - Implement application control policies to restrict the execution of unauthorized or unknown scripts and executables.
Detection coverage 2
Outlook Dialogs Disabled by Non-Outlook Process
highDetects modification of the PONT_STRING registry key in Outlook by a non-Outlook process.
Suspicious Process Modifying Outlook Registry Key
mediumDetects any process other than Outlook modifying specific Outlook registry keys related to security or settings.
Detection queries are kept inside the platform. Get full rules →