<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Etw — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/etw/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:22:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/etw/feed.xml" rel="self" type="application/rss+xml"/><item><title>ETW Registry Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-etw-registry-disabled/</link><pubDate>Wed, 03 Jan 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-etw-registry-disabled/</guid><description>Attackers may disable Event Tracing for Windows (ETW) for the .NET Framework by modifying the ETWEnabled registry value, allowing them to evade endpoint detection and response (EDR) tools and hide malicious activity.</description><content:encoded><![CDATA[<p>The detection identifies registry modifications that disable Event Tracing for Windows (ETW) for the .NET Framework. By modifying the <code>ETWEnabled</code> registry value under the <code>.NETFramework</code> path, attackers can disable ETW, a crucial logging mechanism. This allows them to evade Endpoint Detection and Response (EDR) tools and hide their execution from audit logs. Disabling ETW can allow attackers to operate undetected, potentially leading to further compromise and persistent access within the environment. This technique is a form of defense evasion and can be used in conjunction with other malicious activities to maintain a stealthy presence on the system. The referenced Splunk detection <code>etw_registry_disabled.yml</code> version 17 provides the basis for identifying this behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to the system, possibly through phishing, exploitation of a vulnerability, or compromised credentials.</li>
<li><strong>Privilege Escalation (If Needed):</strong> The attacker escalates privileges to gain the necessary permissions to modify registry keys, if they do not already have them.</li>
<li><strong>Identify ETW Configuration:</strong> The attacker identifies the specific registry path for ETW configuration related to the .NET Framework: <code>HKLM\SOFTWARE\Microsoft\.NETFramework</code>.</li>
<li><strong>Modify Registry Value:</strong> The attacker modifies the <code>ETWEnabled</code> registry value under the identified path to <code>0x00000000</code>, effectively disabling ETW. This may involve using tools like <code>reg.exe</code> or PowerShell to modify the registry.</li>
<li><strong>Execute Malicious Actions:</strong> With ETW disabled, the attacker executes malicious actions, such as deploying malware, performing lateral movement, or exfiltrating data. These actions are less likely to be logged or detected by security tools due to the disabled ETW.</li>
<li><strong>Maintain Persistence:</strong> The attacker establishes persistence mechanisms to maintain access to the system, ensuring that their access is not disrupted by system restarts or other events.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised system as a pivot point to move laterally to other systems within the network, potentially compromising additional resources.</li>
<li><strong>Data Exfiltration/Impact:</strong> The attacker exfiltrates sensitive data from the compromised systems or performs other destructive actions, such as deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling ETW can significantly hinder the ability of security teams to detect and respond to malicious activity. If successful, attackers can operate undetected within the environment, potentially leading to data breaches, financial losses, and reputational damage. Successful exploitation could lead to widespread data exfiltration, system compromise, and deployment of ransomware, impacting all affected systems and potentially leading to significant business disruption. The CISA AA23-347A analytic story highlights the potential for data destruction and wiper malware.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 13 to monitor registry modifications, especially those targeting ETW-related registry keys.</li>
<li>Deploy the Sigma rule <code>Detect ETW Registry Disabled</code> to your SIEM and tune for your environment to detect potential ETW disabling attempts.</li>
<li>Investigate any alerts generated by the <code>Detect ETW Registry Disabled</code> rule to determine the legitimacy of the registry modifications.</li>
<li>Review and harden registry permissions to restrict unauthorized modifications, particularly to sensitive registry keys like those related to ETW configuration, to prevent unauthorized ETW disabling.</li>
<li>Ensure that the official Sysmon TA is at least version 2.0, as mentioned in the &ldquo;How to Implement&rdquo; section, to ensure proper log ingestion and parsing.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>etw</category><category>registry</category><category>defense-evasion</category><category>windows</category><category>t1127</category><category>t1685</category></item><item><title>Detection of ETW Disabling via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-etw-registry/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-etw-registry/</guid><description>Attackers may disable Event Tracing for Windows (ETW) by modifying specific registry keys to evade detection and hinder security monitoring, potentially leading to further system compromise.</description><content:encoded><![CDATA[<p>Attackers may attempt to disable Event Tracing for Windows (ETW) to evade detection mechanisms and make it more difficult for security tools to monitor malicious activities. This is often achieved by modifying specific registry keys associated with .NET Framework ETW settings. By setting the <code>ETWEnabled</code> value to <code>0x00000000</code>, adversaries can effectively turn off ETW, allowing them to execute payloads with minimal alerting. This technique is often observed in ransomware and other advanced attacks where stealth and persistence are crucial for success. This activity is significant because disabling ETW impairs defenses and potentially leads to further compromise of the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is achieved through various means such as phishing, exploitation of vulnerabilities, or compromised credentials.</li>
<li>The attacker gains administrative privileges on the targeted system.</li>
<li>The attacker uses a command-line interface (e.g., <code>cmd.exe</code>, <code>powershell.exe</code>) or a scripting language to interact with the Windows Registry.</li>
<li>The attacker modifies the registry key <code>HKLM\SOFTWARE\Microsoft\.NETFramework\ETWEnabled</code> (or a similar key) setting its value to <code>0x00000000</code>.</li>
<li>This modification disables ETW, preventing the system from logging certain events and activities.</li>
<li>The attacker executes malicious code or payloads without being easily detected.</li>
<li>The attacker moves laterally within the network, compromising additional systems.</li>
<li>The final objective is achieved, such as data exfiltration, ransomware deployment, or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of ETW allows attackers to operate with a significantly reduced risk of detection. This can lead to prolonged periods of undetected malicious activity, resulting in significant data breaches, financial losses, and reputational damage. Ransomware actors, in particular, benefit from this technique as it allows them to encrypt systems without triggering security alerts, maximizing their chances of a successful extortion attempt.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 13 to monitor registry modifications and detect changes to the <code>*\\SOFTWARE\\Microsoft\\.NETFramework\\ETWEnabled</code> registry path (data_source).</li>
<li>Deploy the Sigma rule &ldquo;Detect ETW Disabling Through Registry Modification&rdquo; to your SIEM to identify potential ETW disabling attempts (rules).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes modifying the specified registry keys (rules).</li>
<li>Implement strict access control policies to limit who can modify registry settings (description).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>etw</category><category>ransomware</category><category>windows</category></item><item><title>Registry Modification to Disable .NET ETW Logging</title><link>https://feed.craftedsignal.io/briefs/2024-01-dotnet-etw-disable/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-dotnet-etw-disable/</guid><description>Attackers may modify the Windows registry to disable ETW logging for the .NET Framework, hindering endpoint detection and response capabilities.</description><content:encoded><![CDATA[<p>Attackers may attempt to disable Event Tracing for Windows (ETW) for the .NET Framework to evade detection by security tools. This involves modifying the <code>COMPlus_ETWEnabled</code> registry value to disable .NET ETW logging, preventing security products from monitoring .NET-based threats. The registry value is located under the &ldquo;Environment&rdquo; registry key path for both user (HKCU\Environment) and machine (HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment) scopes. Disabling ETW allows attackers to operate undetected, potentially leading to further compromise and persistent access within the environment. This technique has been observed across various threat actors aiming to evade EDR solutions, making it a critical concern for defenders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system, potentially through phishing or exploitation of a vulnerability.</li>
<li>The attacker escalates privileges to obtain administrative rights.</li>
<li>The attacker identifies the registry key <code>HKCU\Environment</code> or <code>HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment</code>.</li>
<li>The attacker modifies the <code>COMPlus_ETWEnabled</code> registry value to <code>0</code> or <code>0x00000000</code>. This can be achieved through tools like <code>reg.exe</code> or PowerShell.</li>
<li>The system processes the registry change, effectively disabling .NET ETW logging.</li>
<li>The attacker executes malicious .NET code without generating ETW logs.</li>
<li>The attacker performs lateral movement and other malicious activities, evading detection.</li>
<li>The attacker achieves their final objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of .NET ETW logging can severely limit the visibility of security tools into malicious activities, allowing attackers to operate undetected. This can lead to prolonged compromises, data breaches, and ransomware infections. The impact is widespread as it affects any organization relying on .NET ETW for security monitoring. Disabling ETW could bypass many endpoint detection and response (EDR) solutions that rely on this logging, potentially impacting thousands of organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon EventID 13 to monitor registry modifications, as this is the primary data source for detecting the described activity.</li>
<li>Deploy the Sigma rule <code>Detect Dotnet ETW Disabled Via Registry</code> to your SIEM and tune for your environment.</li>
<li>Investigate any changes to the <code>COMPlus_ETWEnabled</code> registry value, especially if initiated by unusual processes.</li>
<li>Monitor for command-line arguments used to modify registry keys via <code>reg.exe</code> or PowerShell, using the Sigma rule <code>Detect Registry Modification via Command Line</code>.</li>
<li>Ensure that your Sysmon configuration is up to date and includes the necessary registry monitoring configurations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>etw</category></item></channel></rss>