<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cloud Signature Update Agent — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/cloud-signature-update-agent/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/cloud-signature-update-agent/feed.xml" rel="self" type="application/rss+xml"/><item><title>Startup or Run Key Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-run-key-registry-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-run-key-registry-modification/</guid><description>Attackers modify registry run keys or startup keys to achieve persistence by referencing a program that executes when a user logs in or the system boots.</description><content:encoded><![CDATA[<p>Attackers often modify registry run keys to achieve persistence on a system. By adding entries to these keys, they ensure that a malicious program executes automatically whenever a user logs in. This technique allows the attacker to maintain access to the compromised system even after reboots or other interruptions. The programs added to these run keys execute under the context of the user account, inheriting its permissions. This activity is often difficult to distinguish from legitimate software installations or updates, requiring careful analysis to identify malicious intent. Elastic has observed this activity and created a detection rule to identify this behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system.</li>
<li>The attacker identifies registry run key locations for persistence.</li>
<li>The attacker modifies a registry run key (e.g., <code>HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run</code>) using tools such as <code>reg.exe</code>.</li>
<li>The attacker adds a malicious executable path to the registry key.</li>
<li>The system is restarted, or a user logs in.</li>
<li>The malicious executable is launched automatically as part of the logon process.</li>
<li>The malicious executable establishes a connection to a command-and-control server.</li>
<li>The attacker gains remote access to the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to compromised systems, enabling them to perform unauthorized activities such as data theft, lateral movement, and deployment of ransomware. While each instance may not cause immediate critical damage, the cumulative effect of multiple persistent infections across an environment can lead to significant data breaches and operational disruption. The Elastic rule attempts to minimize false positives with built-in filters for common legitimate applications and processes like <code>ctfmon.exe</code>, but tuning is required.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to detect suspicious modifications to registry run keys and tune it to filter out legitimate application updates.</li>
<li>Enable registry event logging to capture modifications made to the registry, ensuring that the Sigma rule can function correctly.</li>
<li>Investigate any alerts generated by the Sigma rule, examining the parent process of the process modifying the registry for suspicious activity.</li>
<li>Block known malicious executables and domains identified during triage to prevent further infection.</li>
<li>Use endpoint detection and response (EDR) solutions like Elastic Defend to gain enhanced visibility into endpoint activity and detect malicious behavior associated with persistence mechanisms.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>registry</category><category>runkey</category></item></channel></rss>