<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Notdoor — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/notdoor/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/notdoor/feed.xml" rel="self" type="application/rss+xml"/><item><title>Outlook Dialogs Disabled by Unusual Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-outlook-dialog-disabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-outlook-dialog-disabled/</guid><description>The detection identifies the modification of the Windows Registry key 'PONT_STRING' under Outlook Options by a process other than Outlook.exe, potentially indicating malware activity such as NotDoor.</description><content:encoded><![CDATA[<p>This threat brief addresses a technique where a process other than Outlook modifies the <code>PONT_STRING</code> registry value within Outlook&rsquo;s options. This modification disables certain dialog popups within Outlook, which can allow malicious scripts or actions to execute without user consent or notification. The activity is associated with malware families such as NotDoor. Attackers may leverage this to harvest email information or bypass security warnings. The technique involves modifying the Windows Registry key <code>HKEY_CURRENT_USER\Software\Microsoft\Office\&lt;version&gt;\Outlook\Options\General\PONT_STRING</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a software vulnerability).</li>
<li>The attacker executes a malicious program or script (e.g., PowerShell or VBScript).</li>
<li>The malicious program identifies the Outlook installation and its corresponding registry path.</li>
<li>The malicious program modifies the <code>PONT_STRING</code> value under the <code>HKEY_CURRENT_USER\Software\Microsoft\Office\&lt;version&gt;\Outlook\Options\General\</code> key.</li>
<li>This modification disables Outlook&rsquo;s dialog popups.</li>
<li>The attacker executes further malicious actions, such as harvesting email credentials or injecting malicious content into emails, without user prompts.</li>
<li>Exfiltrate data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass security warnings and execute malicious code within the context of Microsoft Outlook. This can lead to unauthorized access to sensitive email data, credential theft, and the deployment of further malware. While the number of affected organizations is currently unknown, any organization using Microsoft Outlook is potentially at risk. Disabling Outlook dialogs is a common tactic used by malware families like NotDoor to facilitate data exfiltration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 13 (Registry events) to monitor registry modifications, as indicated in the rule&rsquo;s <code>data_source</code>.</li>
<li>Deploy the Sigma rule <code>Outlook Dialogs Disabled by Non-Outlook Process</code> to detect this specific registry modification. Tune the rule using the filter macro as described in the original source.</li>
<li>Investigate any registry modifications to the <code>HKEY_CURRENT_USER\Software\Microsoft\Office\&lt;version&gt;\Outlook\Options\General\PONT_STRING</code> key by processes other than <code>Outlook.exe</code>.</li>
<li>Implement application control policies to restrict the execution of unauthorized or unknown scripts and executables.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>outlook</category><category>registry_modification</category><category>malware</category><category>notdoor</category></item></channel></rss>