SolarWinds Process Disabling Services via Registry Modification
A SolarWinds binary is modifying the start type of a service to be disabled via registry modification, potentially to disable or impair security services.
This threat brief focuses on the detection of SolarWinds processes attempting to disable services by modifying their registry start type. This activity is associated with defense evasion tactics, potentially linked to initial access via supply chain compromise, similar to the SUNBURST campaign. The behavior involves SolarWinds binaries, such as SolarWinds.BusinessLayerHost*.exe and NetFlowService*.exe, manipulating registry entries related to service start configurations. This technique can be used to impair or disable security tools and services, allowing attackers to operate more freely within a compromised environment.
Attack Chain
- Initial compromise of the SolarWinds Orion platform, potentially through a supply chain attack.
- Deployment of a malicious module or payload within the SolarWinds environment.
- Execution of a SolarWinds process, such as
SolarWinds.BusinessLayerHost*.exe. - The SolarWinds process modifies the registry to change the start type of a service.
- The registry modification targets the
HKLM\SYSTEM\ControlSet*\Services\*\Startpath. - The
Startvalue is set to “4” or “0x00000004”, which disables the targeted service. - Disabling critical security services allows the attacker to evade detection and further compromise the system.
- Attacker achieves persistence and performs lateral movement, exfiltrating data or deploying ransomware.
Impact
Successful exploitation can lead to the disabling of critical security services, such as antivirus, endpoint detection and response (EDR) agents, or other monitoring tools. This can significantly reduce the visibility of malicious activity within the network, potentially leading to data breaches, ransomware deployment, or other severe security incidents. The SolarWinds supply chain compromise affected numerous organizations globally, underscoring the potential impact of this type of attack.
Recommendation
- Deploy the Sigma rule
SolarWinds Process Disabling Services via Registryto your SIEM to detect registry modifications by SolarWinds processes aimed at disabling services. - Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function effectively.
- Review and harden access controls for SolarWinds processes to restrict their ability to modify critical system settings.
- Investigate any alerts generated by the Sigma rule, focusing on the affected service and the timeline of events surrounding the registry modification.
- Utilize threat intelligence platforms to stay informed about known SolarWinds-related attack patterns and indicators of compromise (IOCs).
- Monitor endpoints for unusual behavior by SolarWinds processes, including network connections, file modifications, and process creations.
Detection coverage 2
SolarWinds Process Disabling Services via Registry
mediumDetects a SolarWinds binary modifying the start type of a service to be disabled via registry modification.
SolarWinds Process Registry Modification of Service Start
mediumDetects SolarWinds processes modifying the registry to disable services by looking for specific process names and registry paths.
Detection queries are kept inside the platform. Get full rules →