<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Registry-Abuse — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/registry-abuse/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:22:34 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/registry-abuse/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detection of Windows Defender Service Disabling via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disabling-defender-services/</link><pubDate>Wed, 03 Jan 2024 18:22:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disabling-defender-services/</guid><description>This brief covers the detection of adversaries disabling Windows Defender services by modifying specific registry keys to set the 'Start' value to '0x00000004', indicating an attempt to evade detection and maintain persistence.</description><content:encoded><![CDATA[<p>Attackers often disable Windows Defender services to evade detection and ensure the persistence of malware. This involves modifying specific registry keys that control the startup behavior of these services. By setting the &lsquo;Start&rsquo; value to &lsquo;0x00000004&rsquo;, the services are effectively disabled, preventing them from running automatically. This activity is a strong indicator of malicious intent, as it directly interferes with the endpoint&rsquo;s security mechanisms, leaving the system vulnerable to further compromise. The DFIR Report has documented this technique in the context of IcedID infections leading to XingLocker ransomware deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through an initial vector (e.g., phishing).</li>
<li>The attacker obtains elevated privileges on the system.</li>
<li>The attacker identifies the registry keys corresponding to Windows Defender services such as <code>WdBoot</code>, <code>WdFilter</code>, <code>WdNisDrv</code>, <code>WdNisSvc</code>, <code>WinDefend</code>, and <code>SecurityHealthService</code>.</li>
<li>The attacker uses a tool like <code>reg.exe</code> or PowerShell to modify the <code>Start</code> value within these registry keys to <code>0x00000004</code>. For example, <code>reg add &quot;HKLM\System\CurrentControlSet\Services\WinDefend&quot; /v Start /t REG_DWORD /d 4 /f</code></li>
<li>The system&rsquo;s security services are disabled, preventing real-time threat detection and response.</li>
<li>The attacker deploys and executes malware, such as IcedID or other payloads, without interference from Windows Defender.</li>
<li>The attacker establishes persistence mechanisms to maintain access to the compromised system.</li>
<li>Finally, the attacker may proceed to lateral movement, data exfiltration, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling Windows Defender services allows attackers to operate undetected on compromised systems, leading to potential data breaches, malware infections, and ransomware deployment. The DFIR Report details how IcedID malware employs this technique to facilitate XingLocker ransomware attacks. Successful execution results in complete loss of endpoint protection, increasing the risk of widespread infection and data compromise across the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 13 (Registry Event) logging to monitor registry modifications (data_source).</li>
<li>Deploy the Sigma rule &ldquo;Detect Disabling of Windows Defender Services via Registry Modification&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any alerts triggered by registry modifications to Defender service keys with a value of <code>0x00000004</code> to identify potentially compromised systems.</li>
<li>Correlate registry modification events with process creation events to identify the source of the malicious activity.</li>
<li>Monitor for processes accessing or modifying registry keys related to Windows Defender services (affected_products).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category><category>registry-abuse</category></item><item><title>Windows Defender SmartScreen App Install Control Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-app-install-control/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-app-install-control/</guid><description>Attackers modify the Windows Registry to disable Windows Defender SmartScreen App Install Control, potentially allowing the installation of malicious web-based applications without restrictions, leading to system compromise and sensitive information exposure.</description><content:encoded><![CDATA[<p>Attackers are disabling the Windows Defender SmartScreen App Install Control feature by modifying specific registry keys. This action circumvents a built-in Windows security control designed to prevent the installation of potentially malicious applications downloaded from the web. This allows for the installation of harmful applications without user prompts or restrictions, significantly increasing the risk of system compromise. This behavior, while not commonly seen in default configurations, allows for increased attack opportunities. The targeting scope includes Windows systems where the App Install Control feature is enabled, and success allows for further malicious payloads to be executed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker escalates privileges to gain administrative rights if necessary.</li>
<li>The attacker uses a command-line tool like <code>reg.exe</code> or PowerShell to modify the registry.</li>
<li>The attacker modifies the <code>ConfigureAppInstallControl</code> value under the <code>HKLM:\SOFTWARE\Microsoft\Windows Defender\SmartScreen</code> registry key.</li>
<li>The attacker sets the <code>ConfigureAppInstallControl</code> value to &ldquo;Anywhere&rdquo; or modifies <code>ConfigureAppInstallControlEnabled</code> to &ldquo;0x00000000&rdquo;.</li>
<li>The Windows Defender SmartScreen App Install Control is disabled.</li>
<li>The attacker downloads and executes a malicious application from the web.</li>
<li>The malicious application compromises the system, potentially leading to data theft or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling the App Install Control can lead to the installation of malware, potentially affecting a large number of systems. This can result in data breaches, financial loss, and reputational damage. If successful, the attackers gain the ability to bypass built-in security features, increasing the likelihood of a successful compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon EventID 13 logging to monitor registry modifications (reference: Sysmon EventID 13 data source).</li>
<li>Deploy the Sigma rule provided in this brief to your SIEM to detect the modification of the specific registry keys related to App Install Control (reference: Sigma rule).</li>
<li>Investigate any alerts generated by this rule to determine if the activity is malicious.</li>
<li>Implement Group Policy settings to prevent users from modifying these registry keys (reference: <code>Registry.registry_path</code> and <code>Registry.registry_value_data</code> in the Sigma rule).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-abuse</category><category>windows</category></item><item><title>Windows Defender Profile Registry Key Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-win-defender-registry-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-win-defender-registry-deletion/</guid><description>Detection of Windows Defender profile registry key deletion, indicating potential defense evasion by malware or threat actors aiming to disable security controls.</description><content:encoded><![CDATA[<p>This analytic detects the deletion of the Windows Defender main profile registry key, a technique used by attackers to impair endpoint defenses. The deletion is monitored via Sysmon EventID 13, specifically looking for &lsquo;deleted&rsquo; actions within the Windows Defender registry path. This activity is often associated with Remote Access Trojans (RATs) and other malware, as seen in campaigns like the &ldquo;LazyScripter&rdquo; RAT detailed by Malwarebytes in February 2021. Successful deletion of this key can disable Windows Defender, allowing attackers to operate with reduced visibility and resistance, enabling further malicious activities on the compromised system. The &ldquo;LazyScripter&rdquo; RAT, for example, uses similar techniques to disable security products.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through an unknown vector (e.g., phishing, exploit).</li>
<li>The attacker obtains elevated privileges on the system.</li>
<li>The attacker uses a process (e.g., cmd.exe, powershell.exe) to interact with the registry.</li>
<li>The process attempts to delete the Windows Defender profile registry key: <code>HKLM\SOFTWARE\Policies\Microsoft\Windows Defender</code>.</li>
<li>Sysmon Event ID 13 logs the registry key deletion event.</li>
<li>Windows Defender is disabled or its configuration is altered due to the registry change.</li>
<li>The attacker proceeds with deploying malware or performing malicious activities without interference from Windows Defender.</li>
<li>Data exfiltration or other objectives are achieved.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of the Windows Defender profile registry key can severely compromise endpoint security. By disabling or weakening Windows Defender, attackers can operate with reduced visibility, allowing them to deploy malware, steal sensitive data, or establish persistent access without detection. This can lead to data breaches, financial loss, and reputational damage. The scope can range from a single endpoint to an entire organization, depending on the attacker&rsquo;s objectives and the extent of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 13 to monitor registry modifications and deletions, which is crucial for triggering the detections in this brief.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM and tune them based on your environment to minimize false positives and ensure accurate detection.</li>
<li>Investigate any alerts generated by these rules promptly to identify and contain potential defense evasion attempts.</li>
<li>Review and harden registry permissions to prevent unauthorized modifications to critical security settings such as the Windows Defender profile.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-abuse</category><category>windows</category></item><item><title>Windows Defender Phishing Filter Override via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-defender-phishing-filter-override/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-defender-phishing-filter-override/</guid><description>The analytic detects modifications to the Windows registry that disable the Windows Defender phishing filter, potentially allowing attackers to deceive users into visiting malicious websites without browser warnings.</description><content:encoded><![CDATA[<p>This detection focuses on identifying attempts to disable the Windows Defender phishing filter by modifying specific registry values. Attackers may attempt to disable this security feature to increase the likelihood of successful phishing attacks, where users are tricked into visiting malicious websites. The detection leverages Sysmon Event ID 13 to monitor changes to registry values associated with Microsoft Edge&rsquo;s phishing filter settings. Disabling this filter allows malicious actors to deceive users into visiting harmful websites without triggering browser warnings. This can lead to potential security incidents, such as malware infections or credential theft, if users unknowingly access compromised sites.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access through social engineering or other means.</li>
<li>The attacker obtains administrative privileges on the target system, if necessary.</li>
<li>The attacker uses a script or command-line tool (e.g., <code>reg.exe</code>, PowerShell) to modify the Windows Registry.</li>
<li>The script or command modifies the registry key <code>HKLM\SOFTWARE\Policies\Microsoft\Edge\PhishingFilter</code> or <code>HKCU\SOFTWARE\Microsoft\Edge\PhishingFilter</code>.</li>
<li>The registry value &ldquo;EnabledV9&rdquo; or &ldquo;PreventOverride&rdquo; is set to &ldquo;0x00000000&rdquo; to disable the phishing filter.</li>
<li>The attacker verifies that the phishing filter is disabled in Microsoft Edge.</li>
<li>The attacker launches a phishing campaign, directing users to malicious websites.</li>
<li>Users, unaware of the disabled phishing filter, may visit the malicious websites, potentially leading to malware infection or data compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of the Windows Defender phishing filter can significantly increase the risk of successful phishing attacks. Users may unknowingly visit malicious websites, leading to malware infections, credential theft, or other data compromises. This can result in financial losses, reputational damage, and disruption of business operations. While the exact number of potential victims is unknown, the impact could be widespread if the attack is successful on multiple systems within an organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 13 to collect registry modification events, as this is required for the detections in this brief.</li>
<li>Deploy the Sigma rule &ldquo;Windows Defender Phishing Filter Override via Registry Modification&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any detected instances of registry modifications to the <code>*\MicrosoftEdge\PhishingFilter*</code> path, especially when <code>registry_value_data</code> is set to &ldquo;0x00000000&rdquo;.</li>
<li>Educate users about the risks of phishing attacks and encourage them to be cautious when clicking on links or opening attachments from unknown sources.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>registry-abuse</category></item><item><title>Windows AutoLogger Session Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-disable-auto-logger/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-disable-auto-logger/</guid><description>An attacker disables Windows AutoLogger sessions by modifying specific registry values to evade defenses and blind EDR and log ingest tools.</description><content:encoded><![CDATA[<p>Attackers are known to disable Windows AutoLogger sessions to impair defenses and evade detection. This technique involves modifying specific registry values associated with AutoLogger sessions and their providers, effectively blinding EDR solutions and log ingest tools. By setting the &ldquo;Start&rdquo; or &ldquo;Enabled&rdquo; values under the <code>\WMI\Autologger\</code> registry key to <code>0x00000000</code>, adversaries can stop the collection of crucial event data. This activity is often observed post-compromise, as a means to conceal further malicious actions and maintain persistence on the affected system. Malware such as IcedID and ransomware variants have been observed using similar techniques to impair logging and detection capabilities. The scope of this threat includes any Windows system where adversaries have gained sufficient privileges to modify registry settings related to event logging.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the target system through methods such as phishing or exploiting a software vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges to gain administrative access, allowing them to modify system-level settings.</li>
<li><strong>Discovery:</strong> The attacker identifies the registry keys associated with Windows AutoLogger sessions, typically located under <code>HKLM\System\CurrentControlSet\Control\WMI\Autologger</code>.</li>
<li><strong>Defense Evasion:</strong> The attacker modifies the <code>Start</code> or <code>Enabled</code> registry values for specific AutoLogger sessions or providers within the <code>\WMI\Autologger\</code> path. The values are set to <code>0x00000000</code> to disable the logging session.</li>
<li><strong>Persistence:</strong> The attacker may establish persistence through various methods.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally to other systems on the network, repeating the defense evasion steps to blind security tools across the environment.</li>
<li><strong>Data Exfiltration/Ransomware Deployment:</strong> With logging impaired, the attacker proceeds to exfiltrate sensitive data or deploy ransomware, hindering incident response efforts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this attack can severely impair an organization&rsquo;s ability to detect and respond to security incidents. By disabling AutoLogger sessions, attackers effectively blind EDR solutions and prevent the collection of critical event data. This can lead to delayed detection of malicious activity, increased dwell time, and ultimately, greater damage from data breaches or ransomware attacks. Several campaigns, including those involving IcedID and XingLocker ransomware, have leveraged similar techniques.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon EventID 13 to monitor registry modifications, as specified in the <code>data_source</code> section.</li>
<li>Deploy the Sigma rule <code>Disable AutoLogger Session</code> to detect changes to AutoLogger registry values.</li>
<li>Investigate any alerts generated by the Sigma rule <code>Disable AutoLogger Session</code> to determine if the activity is malicious.</li>
<li>Review and harden registry permissions to prevent unauthorized modifications to critical system settings.</li>
<li>Utilize the <code>windows_impair_defenses_disable_auto_logger_session_filter</code> macro (referenced in the original Splunk search) to tune detections and reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>registry-abuse</category></item></channel></rss>