<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Hotkey-Disablement — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/hotkey-disablement/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/hotkey-disablement/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Application Hotkey Disablement via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-disable-windows-app-hotkeys/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-disable-windows-app-hotkeys/</guid><description>Attackers disable Windows application hotkeys by modifying specific registry entries to hinder incident response and evade detection.</description><content:encoded><![CDATA[<p>Attackers may disable Windows application hotkeys by modifying specific registry entries. This tactic aims to impair an analyst&rsquo;s ability to use essential tools like Task Manager and Command Prompt, hindering incident response efforts. The technique leverages registry modifications to disable hotkeys for native applications, complicating remediation and potentially enabling persistence. The activity involves setting the &lsquo;Debugger&rsquo; value to &ldquo;HotKey Disabled&rdquo; under specific &lsquo;Image File Execution Options&rsquo; registry keys.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through unspecified means.</li>
<li>The attacker escalates privileges to allow registry modifications.</li>
<li>The attacker navigates to the <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options</code> registry key.</li>
<li>The attacker creates or modifies a subkey for a specific executable (e.g., <code>taskmgr.exe</code>, <code>cmd.exe</code>).</li>
<li>The attacker creates or modifies a value named <code>Debugger</code> within the subkey.</li>
<li>The attacker sets the <code>Debugger</code> value to <code>HotKey Disabled</code>, effectively disabling hotkeys for the target application.</li>
<li>The analyst attempts to use hotkeys for incident response and finds them non-functional.</li>
<li>The attacker maintains persistence and complicates incident response efforts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling Windows application hotkeys can severely hinder incident response capabilities. By rendering tools like Task Manager and Command Prompt inaccessible via hotkeys, analysts are forced to use alternative, slower methods. This can delay critical tasks such as identifying and terminating malicious processes, giving the attacker more time to operate undetected. The impact can affect any organization relying on standard Windows tools for security monitoring and incident handling.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon EventID 13 logging to detect registry modifications as described in the overview.</li>
<li>Deploy the Sigma rule <code>Detect Windows App Hotkey Disablement</code> to your SIEM to identify this specific registry modification.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the <code>Registry.dest</code> field to identify affected systems.</li>
<li>Review systems identified with disabled hotkeys for other signs of compromise based on the registry modifications.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>registry-modification</category><category>defense-evasion</category><category>persistence</category><category>hotkey-disablement</category></item></channel></rss>