<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Windows Defender SmartScreen — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/windows-defender-smartscreen/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/windows-defender-smartscreen/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Defender SmartScreen Level Downgrade to 'Warn'</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-smartscreen-downgrade/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-smartscreen-downgrade/</guid><description>This analytic detects modifications to the Windows Registry to set Windows Defender SmartScreen level to 'Warn', which can reduce user suspicion and increase the risk of malware execution.</description><content:encoded><![CDATA[<p>This detection focuses on identifying attempts to weaken Windows Defender SmartScreen by modifying registry settings. SmartScreen is a security feature designed to protect users from malicious websites and files. Attackers may attempt to lower the protection level to &ldquo;Warn&rdquo; from its default settings to reduce user suspicion when running potentially malicious executables. This allows malware to execute with a warning prompt, increasing the chances of successful deployment. This activity is often part of a broader defense evasion strategy employed after initial access has been gained. The detection specifically monitors changes to the <code>ShellSmartScreenLevel</code> registry value.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system, typically through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a process with elevated privileges (e.g., via UAC bypass) to modify the registry.</li>
<li>The process modifies the registry key <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ShellSmartScreenLevel</code> or <code>HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ShellSmartScreenLevel</code>.</li>
<li>The registry value <code>ShellSmartScreenLevel</code> is set to &ldquo;Warn&rdquo;.</li>
<li>The modified registry setting takes effect, causing SmartScreen to only display a warning when a potentially malicious executable is run.</li>
<li>The attacker executes a malicious executable that would normally be blocked by SmartScreen.</li>
<li>SmartScreen displays a warning prompt instead of blocking the execution.</li>
<li>The user, less suspicious due to the less severe warning, allows the executable to run, leading to system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the SmartScreen level can lead to a compromised system. If a user is tricked into running malware due to the less stringent warning, attackers can achieve code execution, persistence, and further lateral movement within the network. This can result in data theft, ransomware deployment, or other malicious activities. While specific victim counts are unavailable, the impact can be significant depending on the targeted environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 13 logging to monitor registry modifications (as per the data_source in the rule).</li>
<li>Deploy the Sigma rule <code>Detect SmartScreen Downgrade via Registry Modification</code> to your SIEM and tune for your environment.</li>
<li>Investigate any detected instances of <code>ShellSmartScreenLevel</code> being set to &ldquo;Warn&rdquo; to determine if the activity is malicious.</li>
<li>Block processes attempting to modify the <code>ShellSmartScreenLevel</code> registry value using endpoint detection and response (EDR) tools (based on the Registry.registry_path in the rule).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>windows</category></item></channel></rss>