<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Antivirus — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/antivirus/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/antivirus/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Defender Antivirus Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-defender-registry/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-defender-registry/</guid><description>Attackers modify Windows Defender registry settings to disable antivirus and antispyware protections, evading detection and maintaining persistence.</description><content:encoded><![CDATA[<p>Attackers commonly disable Windows Defender to evade detection and maintain persistence on compromised systems. This involves modifying specific registry keys associated with Windows Defender policies. The activity is significant because disabling antivirus protections allows attackers to execute further malicious activities undetected, leading to potential data breaches, system compromise, and further propagation of malware within the network. This technique has been observed in campaigns involving malware families such as IcedID, Black Basta ransomware, and Cactus ransomware. Detection of this behavior is crucial for identifying and mitigating potential threats early in the attack chain.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through various methods, such as phishing or exploiting vulnerabilities.</li>
<li>The attacker obtains administrative privileges on the target system.</li>
<li>The attacker uses tools like <code>reg.exe</code> or PowerShell to modify the registry.</li>
<li>The registry key <code>HKLM\SOFTWARE\Policies\Microsoft\Windows Defender</code> is targeted.</li>
<li>The <code>DisableAntiSpyware</code> value is set to <code>0x00000001</code> to disable antispyware.</li>
<li>The <code>DisableAntiVirus</code> value is set to <code>0x00000001</code> to disable antivirus.</li>
<li>Windows Defender is effectively disabled, allowing malware execution without detection.</li>
<li>The attacker proceeds with further malicious activities, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of Windows Defender can lead to complete system compromise. Attackers can install malware, exfiltrate sensitive data, or deploy ransomware without interference. This can result in significant financial losses, reputational damage, and operational disruption. Observed instances of this technique have been linked to IcedID infections leading to XingLocker ransomware deployment, as well as other ransomware families like Black Basta and Cactus.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon EventID 13 logging to capture registry modification events.</li>
<li>Deploy the Sigma rules provided in this brief to detect the specific registry modifications.</li>
<li>Investigate any alerts triggered by the Sigma rules, focusing on the involved processes and users.</li>
<li>Review and harden Windows Defender Group Policy settings to prevent unauthorized modifications.</li>
<li>Reference the Sigma rule tags to understand which analytic stories are related to this activity (e.g. IcedID, Black Basta, Cactus).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>antivirus</category></item></channel></rss>