<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CrowdStrike Falcon Agent — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/crowdstrike-falcon-agent/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/crowdstrike-falcon-agent/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detection of Suspicious CrowdStrike Agent Registry Key Removal</title><link>https://feed.craftedsignal.io/briefs/2024-01-crowdstrike-registry-removal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-crowdstrike-registry-removal/</guid><description>This detection identifies delete events on CrowdStrike registry keys, which typically occur during agent uninstallation, so any unplanned or unexpected removal of these keys should be investigated for malicious activity such as defense evasion or exploits like CVE-2022-44721.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of unauthorized or suspicious removal of CrowdStrike agent registry keys on Windows systems. CrowdStrike&rsquo;s Falcon agent relies on specific registry keys for its operation and configuration. While removal of these keys is a normal part of the agent uninstallation process, unauthorized or unexpected removal can indicate malicious activity, such as attempts to disable or circumvent the agent. Specifically, threat actors might target these keys to disable the endpoint detection and response (EDR) capabilities of the CrowdStrike agent, potentially as part of a broader attack to evade detection. This is especially relevant in the context of known vulnerabilities like CVE-2022-44721, which could be exploited to facilitate unauthorized agent manipulation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the system through various means, such as exploiting a vulnerability, phishing, or compromising credentials.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges to obtain the necessary permissions to modify or delete registry keys, potentially using exploits or known vulnerabilities.</li>
<li><strong>Discovery:</strong> The attacker identifies the specific registry keys associated with the CrowdStrike Falcon agent.</li>
<li><strong>Defense Evasion:</strong> The attacker attempts to disable or uninstall the CrowdStrike agent by removing its registry keys. This action aims to prevent the agent from detecting or responding to malicious activities.</li>
<li><strong>Registry Key Deletion:</strong> The attacker executes a command or script to delete the identified CrowdStrike registry keys using tools like <code>reg delete</code> or PowerShell.</li>
<li><strong>Persistence (Optional):</strong> The attacker might establish persistence through other means if the agent removal is incomplete or unsuccessful.</li>
<li><strong>Lateral Movement &amp; Further Exploitation:</strong> With the CrowdStrike agent disabled or impaired, the attacker can move laterally within the network and perform other malicious activities without being detected by the compromised endpoint&rsquo;s primary security solution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful removal of CrowdStrike agent registry keys can lead to a significant degradation of endpoint security. The compromised system becomes more vulnerable to malware infections, data breaches, and other security incidents. An attacker can perform malicious actions on the endpoint without being detected by the CrowdStrike Falcon agent, potentially impacting multiple systems within the organization. Organizations utilizing CrowdStrike for endpoint protection are particularly at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect CrowdStrike Registry Key Deletion via Sysmon</code> to detect registry key deletion events related to CrowdStrike.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes and users involved in the registry key deletion, to determine if the activity is legitimate or malicious.</li>
<li>Review systems for potential exploitation of CVE-2022-44721 by examining process execution and registry modifications related to CrowdStrike.</li>
<li>Enable Sysmon Event ID 12 to ensure registry modification events are captured and available for analysis.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>endpoint</category></item></channel></rss>