<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Blockatfirstseen — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/blockatfirstseen/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/blockatfirstseen/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Defender BlockAtFirstSeen Feature Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-defender-blockatfirstseen/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-defender-blockatfirstseen/</guid><description>An attacker modifies the Windows Registry to disable the Windows Defender BlockAtFirstSeen feature, potentially allowing malware to bypass initial detection and increasing the risk of system compromise.</description><content:encoded><![CDATA[<p>This threat brief addresses the disabling of the Windows Defender BlockAtFirstSeen feature through registry modification. The BlockAtFirstSeen feature provides initial protection against new and unknown threats. Attackers may disable this feature to bypass these initial detection mechanisms, increasing the likelihood of successful malware execution and subsequent system compromise. The analytic detects modifications to the <code>DisableBlockAtFirstSeen</code> registry value under the <code>Microsoft\Windows Defender\SpyNet</code> path. The activity is significant because it weakens the endpoint&rsquo;s security posture, creating an opportunity for malware to execute undetected. Observed in attacks such as IcedID, this technique can lead to ransomware deployment and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through methods such as phishing or exploitation of vulnerabilities.</li>
<li>The attacker executes code on the target system.</li>
<li>The attacker identifies the registry key associated with Windows Defender SpyNet: <code>HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet</code>.</li>
<li>The attacker modifies the <code>DisableBlockAtFirstSeen</code> value within the SpyNet registry key.</li>
<li>The <code>DisableBlockAtFirstSeen</code> value is set to <code>0x00000001</code> to disable the feature.</li>
<li>Windows Defender no longer blocks the execution of files based on reputation.</li>
<li>The attacker executes malicious payloads that would normally be blocked.</li>
<li>The attacker achieves their objective, such as deploying ransomware, exfiltrating data, or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling the BlockAtFirstSeen feature significantly reduces the effectiveness of Windows Defender, potentially exposing systems to new and unknown malware threats. Successful exploitation can lead to malware infection, system compromise, data breaches, and ransomware deployment. The DFIR Report has observed this technique being used in conjunction with IcedID leading to Xinglocker ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Registry Modification to Disable BlockAtFirstSeen</code> to your SIEM to detect this specific registry modification.</li>
<li>Enable Sysmon Event ID 13 (Registry Event) logging to collect the necessary data for the Sigma rules.</li>
<li>Investigate any detected instances of <code>DisableBlockAtFirstSeen</code> registry value modification, prioritizing those occurring on critical systems.</li>
<li>Enforce strict access control policies to prevent unauthorized modification of registry settings.</li>
<li>Monitor systems for signs of malware infection following any detected attempts to disable the BlockAtFirstSeen feature.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>registry_modification</category><category>defender</category><category>blockatfirstseen</category></item></channel></rss>