<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Registry-Modification — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/registry-modification/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/registry-modification/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Port Forwarding Rule Addition via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-port-forwarding-registry/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-port-forwarding-registry/</guid><description>An adversary may abuse port forwarding to bypass network segmentation restrictions by creating a new port forwarding rule through modification of the Windows registry.</description><content:encoded><![CDATA[<p>Attackers may configure port forwarding rules to bypass network segmentation restrictions, effectively using the compromised host as a jump box to access previously unreachable systems. This involves modifying the registry to redirect incoming TCP connections from a local port to another port or a remote computer. The technique is typically employed post-compromise to facilitate lateral movement and maintain unauthorized access within the network. This activity is detected by monitoring changes to the <code>HKLM\SYSTEM\*ControlSet*\Services\PortProxy\v4tov4\</code> registry subkeys.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through an exploit or compromised credentials.</li>
<li>The attacker executes a command-line interface (e.g., <code>cmd.exe</code> or <code>powershell.exe</code>) with administrative privileges.</li>
<li>The attacker uses <code>reg.exe</code> or PowerShell&rsquo;s <code>Set-ItemProperty</code> cmdlet to modify the <code>HKLM\SYSTEM\CurrentControlSet\Services\PortProxy\v4tov4\</code> registry key.</li>
<li>The attacker configures a new port forwarding rule by creating a new subkey under <code>v4tov4\</code> with specific settings for the local port, remote address, and remote port.</li>
<li>The attacker sets the <code>ListenAddress</code>, <code>ListenPort</code>, <code>ConnectAddress</code>, and <code>ConnectPort</code> values within the new subkey.</li>
<li>The attacker verifies the successful creation and activation of the port forwarding rule using <code>netsh interface portproxy show v4tov4</code>.</li>
<li>The attacker leverages the newly created port forwarding rule to tunnel traffic through the compromised host, bypassing network segmentation.</li>
<li>The attacker uses the proxied connection to access internal resources and conduct further attacks, such as lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation enables attackers to bypass network segmentation restrictions, leading to unauthorized access to internal systems and data. This can facilitate lateral movement, data exfiltration, and further compromise of the network. The severity of the impact depends on the sensitivity of the accessible resources and the extent of the attacker&rsquo;s lateral movement.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to capture modifications to the <code>HKLM\SYSTEM\*ControlSet*\Services\PortProxy\v4tov4\</code> registry subkeys, enabling detection of malicious port forwarding rule additions.</li>
<li>Deploy the Sigma rule &ldquo;Port Forwarding Rule Addition via Registry Modification&rdquo; to your SIEM to detect suspicious registry modifications related to port forwarding.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process execution chain and the user account that performed the action.</li>
<li>Regularly review and audit existing port forwarding rules to identify and remove any unauthorized or suspicious configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>port-forwarding</category><category>registry-modification</category><category>command-and-control</category><category>defense-evasion</category><category>windows</category></item><item><title>SIP Provider Modification for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-sip-provider-modification/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sip-provider-modification/</guid><description>This rule detects modifications to the registered Subject Interface Package (SIP) providers, which are used by the Windows cryptographic system to validate file signatures, potentially indicating an attempt to bypass signature validation or inject code for defense evasion.</description><content:encoded><![CDATA[<p>This detection rule identifies modifications to Subject Interface Package (SIP) providers, a critical component of the Windows cryptographic system responsible for validating file signatures. Attackers may attempt to subvert trust controls by modifying SIP providers, allowing them to bypass signature validation checks and potentially inject malicious code into trusted processes. This activity is a form of defense evasion, allowing unauthorized code execution. The rule focuses on detecting suspicious registry changes associated with SIP providers, while excluding known benign processes to minimize false positives. The rule is designed for data generated by Elastic Defend, but also supports third-party data sources like CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon. This activity is related to MITRE ATT&amp;CK technique T1553.003 (SIP and Trust Provider Hijacking).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through various means (e.g., phishing, exploitation of vulnerabilities).</li>
<li>The attacker escalates privileges to gain necessary permissions to modify the registry.</li>
<li>The attacker modifies the registry keys associated with SIP providers, specifically targeting <code>CryptSIPDllPutSignedDataMsg</code> and <code>Trust\\FinalPolicy</code> locations.</li>
<li>The attacker changes the <code>Dll</code> value within these registry keys to point to a malicious DLL.</li>
<li>The system, upon attempting to validate a file signature, loads the malicious DLL instead of the legitimate SIP provider.</li>
<li>The malicious DLL executes arbitrary code, potentially injecting it into other processes.</li>
<li>The attacker uses the injected code to further compromise the system or network.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of SIP providers allows attackers to bypass signature validation checks, leading to the execution of unsigned or malicious code. This can compromise the integrity of the system, leading to data breaches, system instability, or further propagation of malware within the network. The impact can range from individual workstation compromise to widespread organizational damage, depending on the scope of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SIP Provider Modification via Registry</code> to your SIEM and tune it for your environment to detect suspicious registry modifications related to SIP providers.</li>
<li>Enable Sysmon registry event logging to collect the necessary data for the Sigma rules above.</li>
<li>Investigate any alerts generated by the rules, focusing on the process responsible for the registry change and the DLL being loaded, as described in the rule&rsquo;s triage section.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted code.</li>
<li>Monitor the registry paths listed in the Sigma rules for unexpected changes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>registry-modification</category></item><item><title>Potential NetNTLMv1 Downgrade Attack via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-netntlmv1-downgrade/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-netntlmv1-downgrade/</guid><description>This brief details a registry modification attack that downgrades the system to NTLMv1 authentication, enabling NetNTLMv1 downgrade attacks, typically performed with local administrator privileges on Windows systems.</description><content:encoded><![CDATA[<p>This rule detects a specific defense evasion technique where an attacker modifies the Windows registry to force a system to use the less secure NTLMv1 authentication protocol. This is known as a NetNTLMv1 downgrade attack. The registry modification involves changing the <code>LmCompatibilityLevel</code> value, which controls the authentication level. Attackers with local administrator privileges can perform this modification to weaken the authentication mechanism, making it easier to intercept and crack credentials. The rule is designed to detect this activity by monitoring registry events from various sources, including Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Crowdstrike. It is important to monitor for this activity as it can lead to credential theft and further compromise of the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local administrator privileges on a Windows system.</li>
<li>The attacker uses a registry editor or command-line tool (e.g., <code>reg.exe</code>, PowerShell) to modify the <code>LmCompatibilityLevel</code> value in the registry.</li>
<li>The attacker navigates to one of the following registry paths: <code>HKLM\System\CurrentControlSet\Control\Lsa\LmCompatibilityLevel</code> or <code>HKLM\SYSTEM\CurrentControlSet\Control\Lsa</code>.</li>
<li>The attacker sets the <code>LmCompatibilityLevel</code> value to &ldquo;0&rdquo;, &ldquo;1&rdquo;, or &ldquo;2&rdquo; (or their hexadecimal equivalents &ldquo;0x00000000&rdquo;, &ldquo;0x00000001&rdquo;, &ldquo;0x00000002&rdquo;). These values force the system to use NTLMv1.</li>
<li>The system now uses NTLMv1 for authentication attempts.</li>
<li>The attacker initiates a man-in-the-middle attack to capture NTLMv1 authentication traffic using tools like Responder or Inveigh.</li>
<li>The captured NTLMv1 hashes are cracked using brute-force or dictionary attacks, revealing the user&rsquo;s credentials.</li>
<li>The attacker uses the compromised credentials to gain unauthorized access to network resources or other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful NetNTLMv1 downgrade attack can lead to the compromise of user credentials, enabling attackers to move laterally within the network, access sensitive data, and potentially escalate privileges. The impact can range from data breaches to complete system compromise, depending on the attacker&rsquo;s objectives and the compromised user&rsquo;s privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential NetNTLMv1 Downgrade Attack&rdquo; to detect registry modifications setting <code>LmCompatibilityLevel</code> to insecure values (0, 1, 2) within the specified registry paths.</li>
<li>Enable Sysmon registry event logging to ensure the necessary data is available for the Sigma rule to function correctly.</li>
<li>Review registry event logs for unauthorized modifications of <code>LmCompatibilityLevel</code> to confirm legitimate administrative actions.</li>
<li>Implement strict access control policies to limit local administrator privileges and reduce the attack surface.</li>
<li>Monitor the references URL for updates on recommended security configurations related to NTLM authentication.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>ntlm</category><category>registry-modification</category><category>windows</category></item><item><title>Local Account TokenFilter Policy Modification for Defense Evasion and Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-local-account-token-filter-policy-disabled/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-local-account-token-filter-policy-disabled/</guid><description>Adversaries may modify the LocalAccountTokenFilterPolicy registry key to bypass User Account Control (UAC) and gain elevated privileges remotely by granting high-integrity tokens to remote connections from local administrators, facilitating lateral movement and defense evasion.</description><content:encoded><![CDATA[<p>The LocalAccountTokenFilterPolicy is a Windows registry setting that, when enabled (set to 1), allows remote connections from local members of the Administrators group to be granted full high-integrity tokens during negotiation. This bypasses User Account Control (UAC) restrictions, allowing for elevated privileges remotely. Attackers may modify this registry setting to facilitate lateral movement within a network. This rule detects modifications to this specific registry setting, alerting on potential unauthorized changes that could lead to defense evasion and privilege escalation. The modification of this policy has been observed being leveraged in conjunction with pass-the-hash attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through an exploit, such as phishing or exploiting a vulnerability.</li>
<li>The attacker obtains local administrator credentials on the compromised system.</li>
<li>The attacker modifies the LocalAccountTokenFilterPolicy registry key to a value of 1. This is done to allow remote connections from local administrator accounts to receive high-integrity tokens. The registry key is typically located at <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</code>.</li>
<li>The attacker leverages a &ldquo;pass the hash&rdquo; attack (T1550.002) using the compromised local administrator credentials.</li>
<li>The attacker attempts to move laterally to other systems within the network using the &ldquo;pass the hash&rdquo; technique and the modified LocalAccountTokenFilterPolicy.</li>
<li>Due to the LocalAccountTokenFilterPolicy being enabled, the remote connection from the local administrator account receives a full high-integrity token.</li>
<li>The attacker bypasses UAC on the remote system, gaining elevated privileges.</li>
<li>The attacker performs malicious activities on the remote system, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the LocalAccountTokenFilterPolicy allows attackers to bypass User Account Control (UAC) and gain elevated privileges on remote systems, potentially leading to unauthorized access to sensitive data, lateral movement across the network, and the deployment of ransomware. The overall impact can include data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Local Account TokenFilter Policy Enabled</code> to your SIEM and tune for your environment to detect unauthorized modifications to the LocalAccountTokenFilterPolicy registry key.</li>
<li>Enable Sysmon registry event logging to capture modifications to the registry, which is required for the <code>Local Account TokenFilter Policy Enabled</code> Sigma rule.</li>
<li>Review the processes excluded in the rule query and ensure they are legitimate and necessary to prevent false positives.</li>
<li>Monitor registry events for changes to the <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</code> path, specifically looking for changes to the value data.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>persistence</category><category>registry-modification</category></item><item><title>Suspicious Registry Modifications by Scripting Engines</title><link>https://feed.craftedsignal.io/briefs/2026-04-susp-reg-mod/</link><pubDate>Tue, 14 Apr 2026 12:50:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-susp-reg-mod/</guid><description>Scripting engines such as WScript, CScript, and MSHTA are being used to make registry modifications, potentially for persistence or defense evasion.</description><content:encoded><![CDATA[<p>This brief covers suspicious registry modifications made by scripting engine processes like WScript, CScript, and MSHTA. These processes are often abused by attackers to modify the registry without using standard tools like regedit.exe or reg.exe, potentially for evasion and persistence. Legitimate use of these scripting engines to modify the registry is uncommon, making this behavior a good indicator of potential malicious activity. Defenders should monitor for these processes interacting with sensitive registry keys. This activity was observed as of 2025 and continues to be a relevant technique for persistence and defense evasion in 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system via an exploit or social engineering.</li>
<li>The attacker uses MSHTA.exe to execute malicious HTML Application code.</li>
<li>MSHTA.exe is used to launch a PowerShell script.</li>
<li>The PowerShell script uses the Registry module to add a new registry key.</li>
<li>The registry key is configured to execute a payload upon system startup.</li>
<li>The attacker uses wscript.exe or cscript.exe to execute VBScript or JScript.</li>
<li>The script modifies registry values to disable security features.</li>
<li>The compromised system restarts, executing the payload defined in the registry, granting the attacker persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish persistence on the targeted system, enabling them to maintain access even after a reboot. This can lead to data theft, further malware deployment, or complete system compromise. The impact ranges from minor data breaches to significant operational disruptions. The scope of the impact depends on the attacker&rsquo;s objectives and the compromised system&rsquo;s role within the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Registry Tampering by Potentially Suspicious Processes&rdquo; to your SIEM to detect this specific activity, and tune for your environment (rules).</li>
<li>Investigate any instances of wscript.exe, cscript.exe or mshta.exe modifying registry keys outside of known-good paths (rules).</li>
<li>Monitor registry events for unexpected modifications by scripting engines, focusing on persistence-related keys (rules).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>registry-modification</category><category>persistence</category><category>defense-evasion</category><category>scripting-engine</category></item><item><title>DNS Global Query Block List Modified or Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-07-dns-gqbl-modified/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-dns-gqbl-modified/</guid><description>Attackers with DNSAdmin privileges can modify or disable the DNS Global Query Block List (GQBL) in Windows, allowing exploitation of hosts running WPAD with default settings for privilege escalation and lateral movement.</description><content:encoded><![CDATA[<p>The DNS Global Query Block List (GQBL) is a Windows security feature designed to prevent the resolution of specific DNS names, commonly exploited in attacks like WPAD spoofing. Attackers who have obtained elevated privileges, such as DNSAdmin, can modify or disable this list to bypass security controls. This allows exploitation of hosts running WPAD with default settings. The modification of the GQBL can be used for privilege escalation and lateral movement within a network. This rule detects changes to the registry values associated with the GQBL, specifically &ldquo;EnableGlobalQueryBlockList&rdquo; and &ldquo;GlobalQueryBlockList.&rdquo; This activity could indicate an attacker attempting to weaken defenses to facilitate further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through compromised credentials or exploiting a vulnerability.</li>
<li>The attacker escalates privileges to obtain DNSAdmin rights.</li>
<li>The attacker modifies the &ldquo;EnableGlobalQueryBlockList&rdquo; registry value to &ldquo;0&rdquo; or &ldquo;0x00000000,&rdquo; effectively disabling the GQBL.</li>
<li>Alternatively, the attacker modifies the &ldquo;GlobalQueryBlockList&rdquo; registry value to remove &ldquo;wpad&rdquo; from the list.</li>
<li>The attacker leverages the disabled GQBL to conduct WPAD spoofing attacks, redirecting network traffic to attacker-controlled servers.</li>
<li>The attacker captures user credentials transmitted during WPAD authentication.</li>
<li>The attacker uses the captured credentials to move laterally to other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or disabling of the DNS Global Query Block List can lead to WPAD spoofing attacks, credential theft, lateral movement, and ultimately, complete compromise of the network. Attackers can leverage this technique to gain unauthorized access to sensitive data or systems. The impact includes potential data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Registry Modification of DNS Global Query Block List</code> to your SIEM to detect unauthorized changes to the GQBL configuration.</li>
<li>Enable Sysmon registry event logging to capture the necessary events for the Sigma rule to function (reference the logsource in the rule).</li>
<li>Review and restrict DNSAdmin privileges to only necessary accounts to minimize the attack surface (reference: Overview section).</li>
<li>Monitor network traffic for unusual DNS queries or WPAD-related activity, correlating with registry modification events (reference: Attack Chain step 5).</li>
<li>Regularly audit registry settings related to DNS configuration, including the GQBL, to identify unauthorized modifications (reference: Attack Chain steps 3 &amp; 4).</li>
<li>Update security policies and procedures to include specific measures for monitoring and protecting the DNS Global Query Block List (reference: Impact section).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>windows</category></item><item><title>Network-Level Authentication (NLA) Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-nla/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-nla/</guid><description>Adversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.</description><content:encoded><![CDATA[<p>Network Level Authentication (NLA) is a security feature in Windows that requires users to authenticate before establishing a full RDP session, adding an extra layer of protection against unauthorized access. Attackers might attempt to disable NLA to gain access to the Windows sign-in screen without proper authentication. This tactic can facilitate the deployment of persistence mechanisms, such as leveraging Accessibility Features like Sticky Keys, or enable unauthorized remote access. This brief addresses the registry modifications associated with disabling NLA and provides detection strategies to identify such attempts. The references indicate that this technique is used in conjunction with other attacks for lateral movement within a compromised network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the system is gained (potentially via compromised credentials or vulnerability exploitation).</li>
<li>The attacker elevates privileges to modify system-level settings.</li>
<li>The attacker modifies the registry key <code>HKLM\SYSTEM\ControlSet*\Control\Terminal Server\WinStations\RDP-Tcp\UserAuthentication</code> to disable NLA.</li>
<li>The <code>UserAuthentication</code> value is set to &ldquo;0&rdquo; or &ldquo;0x00000000&rdquo;.</li>
<li>The attacker attempts to establish an RDP connection to the compromised system.</li>
<li>Due to the disabled NLA, the attacker bypasses the initial authentication screen.</li>
<li>The attacker leverages accessibility features (e.g., Sticky Keys) for persistence or further exploitation.</li>
<li>The attacker gains unauthorized access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of NLA allows attackers to bypass authentication and gain unauthorized access to systems via RDP. This can lead to data theft, malware installation, or further lateral movement within the network. While the exact number of victims and sectors targeted are unspecified, the potential impact includes significant data breaches and system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation and registry event logging to detect the registry modifications (Elastic Defend, Elastic Endgame, Microsoft Defender XDR, SentinelOne, Sysmon).</li>
<li>Deploy the Sigma rule provided to detect attempts to modify the <code>UserAuthentication</code> registry key (Sysmon Registry Events).</li>
<li>Review and harden RDP configurations across the environment to prevent unauthorized access (Microsoft documentation).</li>
<li>Monitor endpoint security policies to detect unauthorized registry modifications (Endpoint Security Policies).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>registry-modification</category><category>windows</category></item><item><title>Suspicious Registry Modifications by Scripting Engines</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-susp-reg-mod/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-susp-reg-mod/</guid><description>The use of scripting engines like WScript and CScript to modify the Windows registry can indicate an attempt to bypass standard tools and evade defenses, potentially for persistence or other malicious activities.</description><content:encoded><![CDATA[<p>Attackers may leverage scripting engines, such as <code>wscript.exe</code> and <code>cscript.exe</code>, to directly modify the Windows Registry. These scripting engines are often abused for malicious purposes, including establishing persistence, escalating privileges, or disabling security controls. These scripting engines can modify the registry without using standard tools like <code>regedit.exe</code> or <code>reg.exe</code>, making it harder to detect malicious registry changes. Defenders should be aware of processes using these engines to modify the registry, as this behavior is uncommon in legitimate software installations or administrative tasks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, potentially through social engineering or exploiting a software vulnerability.</li>
<li>The attacker executes a script (VBScript, JScript) via <code>wscript.exe</code> or <code>cscript.exe</code>.</li>
<li>The script contains commands to modify specific registry keys, such as the Run key for persistence (T1547.001).</li>
<li>The scripting engine process (e.g., <code>wscript.exe</code>) directly interacts with the Windows Registry to set the new values.</li>
<li>Upon system restart or user logon, the modified registry key triggers the execution of a malicious payload.</li>
<li>The attacker achieves persistence on the compromised system, allowing for continued access and control.</li>
<li>The attacker leverages the persistent access to perform lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to persistent access on compromised systems, enabling attackers to execute malicious code, steal sensitive information, or disrupt critical services. The registry modifications performed by scripting engines can bypass traditional security measures and make it difficult to detect and remediate the attack. This can result in significant data loss, financial damage, and reputational harm to affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Registry Tampering by Potentially Suspicious Processes&rdquo; to your SIEM to detect suspicious registry modifications made by scripting engines.</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Registry Tampering by Potentially Suspicious Processes&rdquo; for unusual or unauthorized registry changes.</li>
<li>Monitor registry events for modifications made by processes such as <code>wscript.exe</code> and <code>cscript.exe</code> (logsource: registry_event).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>execution</category><category>registry-modification</category></item><item><title>Windows Defender Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-defender-registry-disable/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-defender-registry-disable/</guid><description>Attackers modify the Windows Defender registry settings to disable the service or set the service to be started manually, evading defenses.</description><content:encoded><![CDATA[<p>Attackers commonly disable Windows Defender to evade detection and facilitate malicious activities. This involves modifying specific registry settings to either disable the service entirely or prevent it from starting automatically. The rule specifically identifies modifications to the <code>DisableAntiSpyware</code> and <code>WinDefend\\Start</code> registry keys. The DFIR Report has documented this technique in real-world incidents, highlighting its effectiveness in bypassing built-in security measures. This allows threat actors to operate with reduced risk of detection, enabling them to deploy malware, exfiltrate data, or perform other malicious actions without immediate interference from the endpoint security solution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, potentially through phishing or exploiting a software vulnerability.</li>
<li>The attacker elevates privileges to obtain the necessary permissions to modify the registry.</li>
<li>The attacker modifies the <code>HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\DisableAntiSpyware</code> registry key to disable Windows Defender, setting its value to &ldquo;1&rdquo; or &ldquo;0x00000001&rdquo;.</li>
<li>Alternatively, the attacker modifies the <code>HKLM\\System\\*ControlSet*\\Services\\WinDefend\\Start</code> registry key to prevent the Windows Defender service from starting automatically. The attacker sets the value to &ldquo;3&rdquo; or &ldquo;4&rdquo; (or their hexadecimal equivalents &ldquo;0x00000003&rdquo;, &ldquo;0x00000004&rdquo;).</li>
<li>The attacker verifies that Windows Defender is disabled by checking the Security Center or attempting to run a scan.</li>
<li>With Windows Defender disabled, the attacker proceeds to deploy malware or execute malicious commands without interference from the antivirus software.</li>
<li>The attacker may further disable security settings and block security-related indicators.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>If successful, this attack can lead to a complete compromise of the affected system. With Windows Defender disabled, the system becomes vulnerable to malware infections, data exfiltration, and other malicious activities. This can result in financial losses, data breaches, and reputational damage for the targeted organization. The lack of immediate detection allows attackers to establish persistence and expand their foothold within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Registry Modification to Disable Windows Defender&rdquo; to your SIEM and tune for your environment to detect unauthorized changes to Windows Defender registry settings.</li>
<li>Monitor registry events for changes to the <code>HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\DisableAntiSpyware</code> and <code>HKLM\\System\\*ControlSet*\\Services\\WinDefend\\Start</code> registry keys using the provided log sources.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process and user account responsible for the registry modifications.</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the Sigma rule to function effectively.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>registry modification</category></item><item><title>Unusual Persistence via Services Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-registry-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-registry-persistence/</guid><description>Detection of processes modifying the Windows services registry key directly, potentially indicating stealthy persistence attempts via abnormal service creation or modification.</description><content:encoded><![CDATA[<p>This detection identifies processes that modify the Windows services registry key directly, bypassing the standard Windows APIs. This behavior can signify an adversary&rsquo;s attempt to establish persistence stealthily by creating new services or altering existing ones in an unexpected manner. The detection logic focuses on changes to the <code>ServiceDLL</code> and <code>ImagePath</code> values within specific registry paths associated with service configurations. This rule is designed for data generated by Elastic Defend and also supports Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon Registry Events. The rule helps security analysts identify potentially malicious activity related to service manipulation, which can lead to persistent access and control over compromised systems. The rule excludes known legitimate processes and paths to minimize false positives, focusing on anomalous registry modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., phishing, exploitation of a vulnerability).</li>
<li>The attacker escalates privileges to gain administrative access, allowing them to modify the registry.</li>
<li>The attacker directly modifies the <code>HKLM\SYSTEM\ControlSet*\Services\*\ServiceDLL</code> or <code>HKLM\SYSTEM\ControlSet*\Services\*\ImagePath</code> registry keys to point to a malicious DLL or executable.</li>
<li>The attacker&rsquo;s malicious DLL or executable is configured to run as a service, ensuring persistence across system reboots.</li>
<li>The compromised service starts automatically during system startup or manually when triggered by the attacker.</li>
<li>The malicious service executes arbitrary code, providing the attacker with persistent control over the system.</li>
<li>The attacker may use the compromised service to perform further malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistence on the compromised system, maintaining access even after reboots or user logoffs. This can lead to long-term control over the system, enabling attackers to perform various malicious activities, including data theft, deployment of ransomware, or use of the system as a foothold for further attacks within the network. The severity is further amplified if critical services are targeted, potentially leading to system instability or denial of service.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to capture the necessary data for this detection (Data Source: Sysmon).</li>
<li>Deploy the provided Sigma rules to your SIEM to detect unusual service registry modifications (Sigma rules).</li>
<li>Tune the Sigma rules by adding exceptions for legitimate software installations or updates that modify service registry keys directly (Sigma rules).</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on processes modifying the <code>ServiceDLL</code> or <code>ImagePath</code> registry values (Sigma rules).</li>
<li>Review endpoint protection policies to ensure that similar unauthorized registry modifications are detected and blocked in the future (Response and remediation).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>windows</category><category>registry modification</category></item><item><title>Suspicious Modifications to Windows Security Support Provider (SSP) Registry</title><link>https://feed.craftedsignal.io/briefs/2024-01-ssp-registry-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ssp-registry-modification/</guid><description>Adversaries may modify the Windows Security Support Provider (SSP) configuration in the registry to establish persistence or evade defenses.</description><content:encoded><![CDATA[<p>Attackers can abuse the Windows Security Support Provider (SSP) mechanism to establish persistence on a compromised system. SSPs are DLLs loaded into the Local Security Authority Subsystem Service (LSASS) process, which handles authentication in Windows. By modifying specific registry keys related to SSP configuration, attackers can force LSASS to load malicious DLLs at startup, effectively creating a persistent backdoor. This technique is often used to maintain unauthorized access to a system even after a reboot. The registry keys of interest are <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packages</code> and <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packages</code>. Successful exploitation allows the attacker to intercept and manipulate authentication credentials.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through an exploit or compromised credentials (not detailed in source).</li>
<li>The attacker escalates privileges to gain administrative rights on the system.</li>
<li>The attacker modifies the registry key <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packages</code> to include a path to a malicious DLL.</li>
<li>Alternatively, the attacker modifies the registry key <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packages</code> to include a path to a malicious DLL.</li>
<li>The attacker triggers a system reboot, or restarts the LSASS process, causing the malicious SSP DLL to be loaded.</li>
<li>The malicious DLL intercepts authentication credentials and exfiltrates them or performs other malicious actions.</li>
<li>The attacker maintains persistent access to the system, even after reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistence and potentially compromise sensitive credentials handled by LSASS. This can lead to lateral movement within the network, data exfiltration, and further system compromise. The impact is significant as it bypasses standard security measures and provides a persistent foothold for malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious SSP Registry Modification&rdquo; to your SIEM to detect unauthorized modifications to SSP registry keys.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function.</li>
<li>Continuously monitor for unexpected processes writing to the <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packages</code> and <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packages</code> registry keys.</li>
<li>Review and whitelist legitimate software installers that frequently modify these registry entries to reduce false positives as mentioned in the brief.</li>
<li>Ensure access controls and permissions are strictly enforced to limit unauthorized modification of critical registry paths related to Security Support Providers.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>registry-modification</category><category>ssp</category></item><item><title>SolarWinds Process Disabling Services via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-solarwinds-service-disable/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-solarwinds-service-disable/</guid><description>A SolarWinds binary is modifying the start type of a service to be disabled via registry modification, potentially to disable or impair security services.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of SolarWinds processes attempting to disable services by modifying their registry start type. This activity is associated with defense evasion tactics, potentially linked to initial access via supply chain compromise, similar to the SUNBURST campaign. The behavior involves SolarWinds binaries, such as <code>SolarWinds.BusinessLayerHost*.exe</code> and <code>NetFlowService*.exe</code>, manipulating registry entries related to service start configurations. This technique can be used to impair or disable security tools and services, allowing attackers to operate more freely within a compromised environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of the SolarWinds Orion platform, potentially through a supply chain attack.</li>
<li>Deployment of a malicious module or payload within the SolarWinds environment.</li>
<li>Execution of a SolarWinds process, such as <code>SolarWinds.BusinessLayerHost*.exe</code>.</li>
<li>The SolarWinds process modifies the registry to change the start type of a service.</li>
<li>The registry modification targets the <code>HKLM\SYSTEM\ControlSet*\Services\*\Start</code> path.</li>
<li>The <code>Start</code> value is set to &ldquo;4&rdquo; or &ldquo;0x00000004&rdquo;, which disables the targeted service.</li>
<li>Disabling critical security services allows the attacker to evade detection and further compromise the system.</li>
<li>Attacker achieves persistence and performs lateral movement, exfiltrating data or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the disabling of critical security services, such as antivirus, endpoint detection and response (EDR) agents, or other monitoring tools. This can significantly reduce the visibility of malicious activity within the network, potentially leading to data breaches, ransomware deployment, or other severe security incidents. The SolarWinds supply chain compromise affected numerous organizations globally, underscoring the potential impact of this type of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>SolarWinds Process Disabling Services via Registry</code> to your SIEM to detect registry modifications by SolarWinds processes aimed at disabling services.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function effectively.</li>
<li>Review and harden access controls for SolarWinds processes to restrict their ability to modify critical system settings.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the affected service and the timeline of events surrounding the registry modification.</li>
<li>Utilize threat intelligence platforms to stay informed about known SolarWinds-related attack patterns and indicators of compromise (IOCs).</li>
<li>Monitor endpoints for unusual behavior by SolarWinds processes, including network connections, file modifications, and process creations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>solarwinds</category><category>defense-evasion</category><category>registry-modification</category><category>supply-chain</category></item><item><title>RDP Enabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-rdp-registry-enabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rdp-registry-enabled/</guid><description>An adversary may enable Remote Desktop Protocol (RDP) access by modifying the `fDenyTSConnections` registry key, potentially indicating lateral movement preparation or defense evasion.</description><content:encoded><![CDATA[<p>Attackers may enable Remote Desktop Protocol (RDP) to facilitate lateral movement within a compromised network. By modifying the <code>fDenyTSConnections</code> registry key to a value of <code>0</code>, attackers can enable remote desktop connections, allowing them to access systems remotely. This technique can be employed using remote registry manipulation or tools like PsExec. The modification of the registry key is a common tactic used by ransomware operators and other threat actors to gain unauthorized access to victim servers. This activity can be performed to enable remote access for initial access or to regain access after persistence mechanisms have failed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system via an exploit or compromised credentials.</li>
<li>The attacker uses a tool like PsExec or leverages remote registry modification capabilities.</li>
<li>The attacker modifies the <code>fDenyTSConnections</code> registry key, setting its value to <code>0</code>. This key is typically located in <code>HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server</code>.</li>
<li>The system&rsquo;s RDP service is enabled or re-enabled as a result of the registry change.</li>
<li>The attacker attempts to connect to the now-enabled RDP service using valid or brute-forced credentials.</li>
<li>Upon successful authentication, the attacker gains interactive access to the system via RDP.</li>
<li>The attacker performs reconnaissance, elevates privileges, and moves laterally to other systems.</li>
<li>The attacker deploys ransomware, exfiltrates data, or achieves other objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the <code>fDenyTSConnections</code> registry key allows unauthorized remote access to systems, potentially leading to lateral movement, data theft, or ransomware deployment. Organizations could suffer significant financial losses, reputational damage, and operational disruption. The scope of the impact depends on the attacker&rsquo;s objectives and the level of access they gain within the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;RDP Enabled via Registry&rdquo; to detect modifications to the <code>fDenyTSConnections</code> registry key (rules).</li>
<li>Monitor process creation events for suspicious use of <code>reg.exe</code> or PowerShell to modify registry keys related to RDP (rules).</li>
<li>Implement network segmentation and firewall rules to restrict RDP traffic to authorized hosts (overview).</li>
<li>Review the privileges assigned to users and ensure the principle of least privilege is enforced (overview).</li>
<li>Enable Sysmon registry event logging to capture registry modifications (setup).</li>
<li>Investigate any alerts related to registry modifications on critical systems (overview).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>defense-evasion</category><category>rdp</category><category>registry-modification</category></item><item><title>NullSessionPipe Registry Modification for Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-nullsessionpipe-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-nullsessionpipe-modification/</guid><description>Attackers modify the NullSessionPipe registry setting in Windows to enable anonymous access to named pipes, potentially facilitating lateral movement and unauthorized access to network resources.</description><content:encoded><![CDATA[<p>This detection rule identifies modifications to the <code>NullSessionPipe</code> registry setting in Windows. This setting defines named pipes that can be accessed without authentication, facilitating anonymous connections. Adversaries may exploit this by modifying the registry to enable lateral movement, allowing unauthorized access to network resources. By adding specific pipes to the <code>NullSessionPipes</code> registry key, an attacker can make services accessible without requiring authentication. This rule focuses on flagging modifications that introduce new accessible pipes, which could indicate malicious intent. The targeted configuration is located under <code>HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters</code>. The registry key <code>NullSessionPipes</code> is of particular interest when its values change.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a system within the network.</li>
<li>The attacker gains elevated privileges on the compromised system.</li>
<li>The attacker modifies the Windows Registry, specifically the <code>HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters\NullSessionPipes</code> key. They add a new pipe name to this key, which will allow unauthenticated access to that named pipe.</li>
<li>The attacker uses <code>reg.exe</code> or PowerShell to modify the registry, potentially using commands like <code>reg add</code> or <code>Set-ItemProperty</code>.</li>
<li>A remote system attempts to connect to the newly accessible named pipe on the compromised system without authenticating.</li>
<li>The attacker exploits the now-accessible service or application associated with the named pipe to execute commands or transfer data.</li>
<li>The attacker leverages this access to move laterally within the network, compromising additional systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the <code>NullSessionPipes</code> registry setting can lead to unauthorized access to sensitive resources and lateral movement within the network. By enabling anonymous access to named pipes, attackers can potentially bypass authentication mechanisms and gain control over critical systems. While the direct number of victims is not specified, the impact can be significant, particularly in organizations where shared resources and services rely on secure authentication protocols.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Registry auditing to capture changes to the <code>NullSessionPipes</code> registry key. This will allow you to detect unauthorized modifications as described in the overview.</li>
<li>Deploy the Sigma rule &ldquo;NullSessionPipe Registry Modification&rdquo; to your SIEM and tune for your environment to identify malicious activity related to named pipe modifications.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the specific named pipes being added or modified in the registry event details, as detailed in the rule&rsquo;s description.</li>
<li>Regularly review and validate the legitimacy of existing entries in the <code>NullSessionPipes</code> registry key to identify and remove any unauthorized pipes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>defense-evasion</category><category>registry-modification</category></item><item><title>Network Logon Provider Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-network-logon-provider-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-network-logon-provider-modification/</guid><description>Adversaries may modify the network logon provider registry to register a rogue network logon provider module for persistence and credential access by intercepting authentication credentials in clear text during user logon.</description><content:encoded><![CDATA[<p>Attackers may modify the network logon provider registry to gain persistence or access credentials. This involves registering a rogue network logon provider module that intercepts authentication credentials in clear text during user logon. The modification of the ProviderPath key under the NetworkProvider service registry path can be indicative of this malicious activity. The registry modification is often performed by non-system accounts and the adversary will attempt to hide the malicious DLL by placing it in common directories. This technique allows adversaries to steal user credentials or maintain persistent access to the compromised system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, possibly through exploiting a vulnerability or using compromised credentials.</li>
<li>The attacker elevates privileges to obtain the necessary permissions to modify the registry.</li>
<li>The attacker locates the registry key related to network logon providers: <code>HKLM\SYSTEM\CurrentControlSet\Services\*\NetworkProvider\ProviderPath</code>.</li>
<li>The attacker modifies the <code>ProviderPath</code> registry value to point to a malicious DLL.</li>
<li>The system loads the malicious DLL during the logon process.</li>
<li>The malicious DLL intercepts user credentials in clear text.</li>
<li>The attacker harvests the intercepted credentials.</li>
<li>The attacker uses the harvested credentials for lateral movement or further exploitation of the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the compromise of user credentials, allowing attackers to gain unauthorized access to sensitive systems and data. Modification of the network logon provider registry enables attackers to maintain persistent access to the compromised system, even after a reboot. This can result in data breaches, financial losses, and reputational damage. The severity depends on the level of access granted to the compromised accounts and the sensitivity of the data they can access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry modifications to the <code>HKLM\SYSTEM\CurrentControlSet\Services\*\NetworkProvider\ProviderPath</code> key, using the provided Sigma rule to detect suspicious changes.</li>
<li>Enable Sysmon registry event logging to capture registry modifications.</li>
<li>Regularly audit network logon providers and verify the integrity and authenticity of the registered DLLs.</li>
<li>Investigate processes modifying the registry and their associated file creation events for unknown or suspicious processes.</li>
<li>Block execution of unsigned or untrusted DLLs in the network logon provider path.</li>
<li>Deploy the Sigma rule &ldquo;Network Logon Provider Registry Modification&rdquo; to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>persistence</category><category>registry-modification</category></item><item><title>Microsoft Defender Tampering via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-defender-tampering/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-defender-tampering/</guid><description>Adversaries may disable or tamper with Microsoft Defender features via registry modifications to evade detection and conceal malicious behavior on Windows systems.</description><content:encoded><![CDATA[<p>Attackers commonly disable or tamper with Microsoft Defender features to evade detection and conceal malicious behavior within compromised Windows environments. This is often achieved by modifying specific registry keys that control the behavior and functionality of Defender components, such as real-time monitoring, exploit protection, and tamper protection itself. Such actions can significantly reduce the effectiveness of endpoint security, allowing malicious activities to proceed undetected. The references point to techniques that disable PUA protection, tamper protection, memory integrity, and real-time protection. This behavior is observed across various attack scenarios, including ransomware deployment and cryptocurrency mining campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through an unspecified vector (e.g., phishing, exploitation of a vulnerability).</li>
<li>The attacker obtains elevated privileges on the system.</li>
<li>The attacker uses an administrative tool like <code>reg.exe</code> or PowerShell to modify the registry.</li>
<li>The attacker disables real-time monitoring by setting <code>HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring</code> to 1.</li>
<li>The attacker disables tamper protection by setting <code>HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Features\TamperProtection</code> to 0.</li>
<li>The attacker disables PUA Protection by setting <code>HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\PUAProtection</code> to 0.</li>
<li>With Defender weakened, the attacker executes malicious payloads, such as ransomware or cryptocurrency miners.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful tampering with Microsoft Defender can lead to a significant degradation of endpoint security posture. This can result in undetected malware infections, data breaches, and system compromise. Disabling Defender features can allow attackers to establish persistence, escalate privileges, and deploy malicious payloads without triggering alerts. The impact can range from individual system compromise to widespread network infection, depending on the attacker&rsquo;s objectives and the extent of the tampering.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Microsoft Windows Defender Tampering - Disable Realtime Monitoring&rdquo; to your SIEM to detect modifications to the <code>DisableRealtimeMonitoring</code> registry value.</li>
<li>Deploy the Sigma rule &ldquo;Microsoft Windows Defender Tampering - Disable Tamper Protection&rdquo; to detect modifications to the <code>TamperProtection</code> registry value.</li>
<li>Monitor registry modification events, specifically targeting keys associated with Microsoft Defender settings as described in the rule query.</li>
<li>Investigate any process modifying Windows Defender registry settings that are not explicitly authorized, referencing the process exclusions in the rule query.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>windows</category></item><item><title>DNS-over-HTTPS Enabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-dns-over-https-enabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-dns-over-https-enabled/</guid><description>Detection of DNS-over-HTTPS (DoH) being enabled via registry modifications on Windows systems, potentially indicating defense evasion and obfuscation of network activity by masking DNS queries.</description><content:encoded><![CDATA[<p>The use of DNS-over-HTTPS (DoH) can obscure network activity, potentially allowing malicious actors to bypass traditional DNS monitoring and conceal data exfiltration. When DoH is enabled, visibility into DNS query types, responses, and originating IPs is lost, hindering the detection of malicious activity. This behavior is detected by monitoring registry modifications associated with enabling DoH in popular browsers such as Microsoft Edge, Google Chrome, and Mozilla Firefox. The registry keys targeted are associated with settings that force the browsers to use secure DNS resolution, potentially circumventing organizational security policies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to a Windows system through various means, such as phishing or exploiting a software vulnerability.</li>
<li><strong>Privilege Escalation (if necessary):</strong> The attacker may need to escalate privileges to modify registry settings.</li>
<li><strong>Defense Evasion:</strong> The attacker modifies the Windows registry to enable DNS-over-HTTPS (DoH) in web browsers like Edge, Chrome, or Firefox. This is achieved by modifying specific registry keys such as <code>HKLM\SOFTWARE\Policies\Microsoft\Edge\BuiltInDnsClientEnabled</code>, <code>HKLM\SOFTWARE\Google\Chrome\DnsOverHttpsMode</code>, or <code>HKLM\SOFTWARE\Policies\Mozilla\Firefox\DNSOverHTTPS</code>.</li>
<li><strong>Obfuscation:</strong> By enabling DoH, the attacker encrypts DNS queries, making it difficult for network monitoring tools to inspect DNS traffic.</li>
<li><strong>Command and Control:</strong> The attacker establishes command and control (C2) communication with a remote server over encrypted DNS traffic, evading traditional network-based detection methods.</li>
<li><strong>Data Exfiltration:</strong> The attacker uses the encrypted DNS channel to exfiltrate sensitive data, bypassing network security controls that rely on DNS inspection.</li>
<li><strong>Persistence (Optional):</strong> The attacker might establish persistence by ensuring the DoH settings remain enabled across system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to a loss of visibility into DNS traffic, hindering incident response and threat hunting efforts. Attackers can effectively hide command-and-control communications and data exfiltration activities. Although this activity by itself isn&rsquo;t inherently malicious, it removes a layer of defense, increasing the risk that malicious activities will go undetected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect the enabling of DNS-over-HTTPS via registry modifications.</li>
<li>Enable Sysmon registry event logging to capture the necessary events for the provided Sigma rules to function effectively.</li>
<li>Review and update security policies to ensure DNS-over-HTTPS is only enabled through approved channels and for legitimate purposes, reducing the risk of misuse, and create exceptions in the detection rule for systems where this is a known requirement.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on identifying the user account, process, and associated network activity (reference the investigation guide in the source URL).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>dns-over-https</category><category>registry-modification</category></item><item><title>Modification of WDigest Security Provider</title><link>https://feed.craftedsignal.io/briefs/2024-01-wdigest-modification/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wdigest-modification/</guid><description>The rule detects attempts to modify the WDigest security provider in the registry to force the user's password to be stored in clear text in memory, which could lead to credential dumping.</description><content:encoded><![CDATA[<p>The WDigest security provider is a legacy authentication protocol that, when enabled, stores user passwords in cleartext within LSASS memory. Modern Windows versions (8.1+ and Server 2012 R2+) disable this behavior by default. Attackers can modify the <code>UseLogonCredential</code> registry value under the WDigest configuration to re-enable plaintext credential caching. This manipulation is a common precursor to credential dumping attacks, where tools like Mimikatz are used to extract sensitive information from LSASS. Defenders should monitor for unauthorized modifications to the WDigest configuration to prevent credential theft. The rule provided by Elastic aims to detect these modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system via compromised credentials or exploiting a vulnerability (e.g., phishing or RDP).</li>
<li>The attacker executes code (e.g., PowerShell script or executable) with sufficient privileges to modify the registry.</li>
<li>The malicious code modifies the <code>UseLogonCredential</code> registry value under <code>HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest</code> or a similar path.</li>
<li>The attacker sets the <code>UseLogonCredential</code> value to 1 (or 0x00000001), enabling plaintext storage of credentials.</li>
<li>A user logs on to the system, causing their credentials to be stored in cleartext in LSASS memory.</li>
<li>The attacker uses credential dumping tools like Mimikatz to extract the cleartext passwords from LSASS.</li>
<li>The attacker uses the stolen credentials for lateral movement or to access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the WDigest security provider can lead to widespread credential compromise. Attackers can harvest credentials for privileged accounts, enabling them to move laterally within the network, access sensitive resources, and potentially achieve domain dominance. This can result in data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Modification of WDigest Security Provider&rdquo; to your SIEM to detect malicious registry modifications (rule <code>d703a5af-d5b0-43bd-8ddb-7a5d500b7da5</code>).</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the provided Sigma rule to function.</li>
<li>Monitor process creation events for unexpected processes modifying registry keys related to WDigest.</li>
<li>Review and restrict access control lists (ACLs) on the WDigest registry keys to prevent unauthorized modifications.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process that made the modification, the user context, and any subsequent activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>registry-modification</category><category>windows</category></item><item><title>Code Signing Policy Modification Through Registry</title><link>https://feed.craftedsignal.io/briefs/2024-01-code-signing-policy-modification/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-code-signing-policy-modification/</guid><description>Attackers may modify the Windows registry to disable code signing policy, allowing the execution of unsigned or self-signed malicious code, thereby bypassing security controls and enabling defense evasion.</description><content:encoded><![CDATA[<p>Attackers can modify the <code>BehaviorOnFailedVerify</code> registry key to disable code signing enforcement, allowing the execution of unsigned or self-signed code. This subverts trust controls and enables attackers to load and execute malicious drivers or other executables without proper validation. The targeted registry value controls how the system behaves when a driver&rsquo;s signature verification fails, and altering this value can weaken system security. This technique is a common method to bypass security measures that rely on code signing to ensure the integrity and authenticity of software. This activity has been observed across various environments where endpoint detection and response solutions are deployed. The rule identifies registry modifications that can disable DSE.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through methods such as phishing, exploiting vulnerabilities, or social engineering.</li>
<li>The attacker escalates privileges to obtain administrative rights, which are required to modify the registry.</li>
<li>The attacker uses a command-line tool, such as <code>reg.exe</code> or PowerShell, to modify the <code>BehaviorOnFailedVerify</code> registry value.</li>
<li>The registry value is changed to either &ldquo;0&rdquo; or &ldquo;1&rdquo;, effectively disabling or weakening code signing enforcement.</li>
<li>The attacker loads an unsigned or self-signed malicious driver or executable.</li>
<li>The malicious code executes without proper validation, allowing the attacker to perform malicious activities on the system.</li>
<li>The attacker may then establish persistence, move laterally within the network, or exfiltrate sensitive data.</li>
<li>The final objective could be data theft, ransomware deployment, or establishing a long-term foothold within the compromised environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the code signing policy can lead to the execution of arbitrary code without proper validation, potentially compromising the entire system. Attackers can use this technique to install rootkits, bypass security software, and perform other malicious activities. Depending on the attacker&rsquo;s objectives, this can result in data theft, system instability, or complete system compromise. While no specific victim count or sector is mentioned, any Windows system where code signing is relied upon for security is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Code Signing Policy Modification Through Registry</code> to your SIEM to detect suspicious registry modifications (rule.name). Tune the rule to exclude legitimate software installers or system administration tools that may temporarily modify these settings.</li>
<li>Monitor registry events, specifically changes to the <code>BehaviorOnFailedVerify</code> value, to identify potential attempts to disable code signing policy (event.type, registry.value, registry.data.strings).</li>
<li>Investigate any alerts generated by the detection rule, focusing on the process execution chain and the legitimacy of the user account performing the action (rule.note).</li>
<li>Enable Sysmon registry event logging to gain better visibility into registry modifications (setup).</li>
<li>Ensure that Driver Signature Enforcement (DSE) is enabled on all systems to prevent the loading of unsigned drivers (rule.description).</li>
<li>Deploy the Sigma rule <code>Suspicious Process Modifying Code Signing Policy Registry</code> to identify potentially malicious processes attempting to disable code signing (rule.name).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>code-signing</category></item></channel></rss>