<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SentinelStaticEngineScanner.exe — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/sentinelstaticenginescanner.exe/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/sentinelstaticenginescanner.exe/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Filtering Platform Policy Added to Block EDR Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-wfp-edr-block/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wfp-edr-block/</guid><description>Attackers modify the Windows Filtering Platform (WFP) policy to block the communication of endpoint detection and response (EDR) processes, impairing their functionality and hindering detection of malicious activities.</description><content:encoded><![CDATA[<p>Attackers may attempt to disable or impair endpoint detection and response (EDR) solutions to evade detection and maintain persistence on compromised systems. One method to achieve this is by manipulating the Windows Filtering Platform (WFP) to block network communication of EDR processes. This involves adding or modifying WFP policies to prevent EDR agents from sending telemetry or receiving updates. The technique is used to blind security tools, giving attackers more time to operate undetected. This brief focuses on detecting modifications to WFP policies that specifically target known EDR processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through methods such as phishing or exploiting a vulnerability.</li>
<li>The attacker elevates privileges to gain administrative access, allowing them to modify system-level configurations.</li>
<li>The attacker uses a command-line tool like <code>netsh</code> or PowerShell to interact with the Windows Filtering Platform (WFP).</li>
<li>The attacker creates or modifies a WFP policy rule targeting specific EDR processes (e.g., <code>SentinelAgent.exe</code>, <code>CylanceSvc.exe</code>).</li>
<li>The WFP policy is configured to block network traffic associated with the targeted EDR processes. The registry key <code>HKLM\SYSTEM\CurrentControlSet\Services\BFE\Parameters\Policy\FirewallPolicy\FirewallRules</code> is modified with the new policy.</li>
<li>The EDR processes are effectively isolated from the network, preventing them from sending telemetry or receiving updates.</li>
<li>The attacker continues their malicious activities, such as lateral movement or data exfiltration, with reduced risk of detection by the impaired EDR solution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful manipulation of the Windows Filtering Platform to block EDR processes can severely degrade the security posture of an organization. Attackers can operate with impunity, leading to data breaches, ransomware deployment, or other malicious outcomes. The number of affected systems depends on the scope of the attack, but even a single compromised endpoint can serve as a beachhead for further intrusion. Organizations in all sectors are at risk, particularly those with valuable data or critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 13 to log Registry modifications, which is essential for detecting changes to WFP policies as shown in the rule <code>Detect Windows Filtering Platform Policy Added to Block EDR</code>.</li>
<li>Deploy the Sigma rule <code>Detect Windows Filtering Platform Policy Added to Block EDR</code> to your SIEM and tune the included list of commonly targeted EDR processes for your specific environment.</li>
<li>Review registry events associated with <code>HKLM\SYSTEM\CurrentControlSet\Services\BFE\Parameters\Policy\FirewallPolicy\FirewallRules</code> for unexpected modifications, particularly those containing &ldquo;Action=Block&rdquo; and targeting security-related processes.</li>
<li>Investigate any alerts generated by the Sigma rule, and verify the legitimacy of any WFP policy changes with authorized IT personnel.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>edr-bypass</category><category>defense-evasion</category><category>wfp</category></item></channel></rss>