<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Registry — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/registry/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 19 Mar 2026 05:23:44 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/registry/feed.xml" rel="self" type="application/rss+xml"/><item><title>RegPwnBOF Registry Symlink Race Condition Exploit</title><link>https://feed.craftedsignal.io/briefs/2024-01-regpwnbof/</link><pubDate>Thu, 19 Mar 2026 05:23:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-regpwnbof/</guid><description>RegPwnBOF exploits a registry symlink race condition in the Windows Accessibility ATConfig mechanism, enabling a normal user to write arbitrary values to protected HKLM registry keys for persistence and privilege escalation.</description><content:encoded><![CDATA[<p>RegPwnBOF is an exploit leveraging a registry symlink race condition within the Windows Accessibility ATConfig mechanism. This vulnerability allows an unprivileged user to manipulate protected areas of the registry, specifically HKLM, which are typically reserved for administrators or system processes. By exploiting this race condition, an attacker can write arbitrary values to these protected keys. The initial report surfaced around March 2026, highlighting the potential for unauthorized persistence and privilege escalation. This circumvents standard Windows security controls, posing a significant risk to system integrity and confidentiality. The exploit&rsquo;s accessibility to non-administrator users makes it particularly dangerous in environments where least-privilege principles are not strictly enforced.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unprivileged user initiates the ATConfig mechanism within the Windows Accessibility features.</li>
<li>The exploit creates a registry symlink pointing to a protected HKLM key.</li>
<li>A race condition is triggered during the ATConfig process, allowing the exploit to bypass security checks.</li>
<li>The attacker leverages this race condition to overwrite the target HKLM registry key with arbitrary data.</li>
<li>The modified registry key is used to establish persistence, for example, by creating a Run key.</li>
<li>Upon system restart or user login, the malicious payload associated with the modified Run key is executed.</li>
<li>The attacker gains elevated privileges by executing code within the context of a privileged process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of RegPwnBOF allows an attacker to gain persistent access to a compromised system and escalate their privileges to administrator level. This can lead to complete system compromise, data theft, and the installation of malware. The impact is magnified by the fact that this exploit can be triggered by a normal user, bypassing traditional access controls. The number of potential victims is considerable, as the vulnerability exists within the Windows Accessibility features, which are enabled by default on many systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry modifications targeting HKLM keys, especially those related to Accessibility features, using a process_creation log source and the provided Sigma rules.</li>
<li>Implement strict access controls and least-privilege principles to limit the ability of unprivileged users to interact with system-level configurations.</li>
<li>Investigate any unusual registry symlink creation events using file_event logs, particularly those involving the ATConfig mechanism, to identify potential RegPwnBOF exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>registry</category><category>symlink</category><category>race-condition</category><category>accessibility</category><category>privilege-escalation</category><category>persistence</category><category>windows</category></item><item><title>Netsh Helper DLL Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-netsh-helper-dll/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netsh-helper-dll/</guid><description>Attackers may abuse the Netsh Helper DLL functionality by adding malicious DLLs to execute payloads every time the netsh utility is executed via administrators or scheduled tasks, achieving persistence.</description><content:encoded><![CDATA[<p>The <code>netsh.exe</code> utility in Windows supports the addition of Helper DLLs to extend its functionality. An attacker can abuse this mechanism to establish persistence by adding a malicious DLL. When <code>netsh.exe</code> is executed, the malicious DLL is loaded and executed, allowing the attacker to run arbitrary code with the privileges of the user or process that initiated <code>netsh.exe</code>. This can be done by administrators or scheduled tasks, making it a stealthy and effective persistence technique. The registry key targeted by this technique is <code>HKLM\Software\Microsoft\netsh\</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system through unspecified means.</li>
<li>Attacker creates a malicious DLL to be used as a Netsh Helper DLL.</li>
<li>Attacker modifies the Windows Registry to add the malicious DLL as a Netsh Helper DLL under <code>HKLM\Software\Microsoft\netsh\</code>.</li>
<li>The system administrator or a scheduled task executes <code>netsh.exe</code>.</li>
<li><code>netsh.exe</code> loads and executes the malicious DLL, granting the attacker code execution.</li>
<li>The malicious DLL performs its intended actions, such as establishing a reverse shell or deploying additional malware.</li>
<li>The attacker maintains persistence on the system through the malicious Netsh Helper DLL.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish persistent access to a compromised system. This can lead to data theft, system compromise, and further malicious activities. While the risk score is low, the persistence mechanism can allow attackers to maintain a foothold for extended periods, increasing the potential for significant damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry modifications under the <code>HKLM\Software\Microsoft\netsh\</code> path for suspicious DLL additions using the &ldquo;Netsh Helper DLL Registry Modification&rdquo; Sigma rule.</li>
<li>Enable Sysmon registry event logging to collect the necessary data for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the DLL file properties, timestamps, and related processes.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>windows</category><category>netsh</category><category>registry</category></item><item><title>AMSI Enable Registry Key Modification for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-amsi-registry-disable/</link><pubDate>Sat, 27 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-amsi-registry-disable/</guid><description>Adversaries modify the AmsiEnable registry key to 0 to disable Windows Script AMSI scanning, bypassing AMSI protections for Windows Script Host or JScript execution.</description><content:encoded><![CDATA[<p>Attackers can disable the Antimalware Scan Interface (AMSI) to evade detection by modifying the <code>AmsiEnable</code> registry key. This technique is commonly employed to execute malicious scripts without triggering security warnings or blocks. The AMSI, a Windows feature, allows applications and services to request the scanning of potentially malicious content (e.g., PowerShell scripts, JScript) before execution. By setting the <code>AmsiEnable</code> value to 0, an attacker can disable AMSI for the current user, effectively bypassing real-time script scanning. This action is often a precursor to deploying further malicious payloads or establishing persistence on a compromised system. This behavior has been observed since at least 2019 and continues to be a relevant defense evasion technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a script or binary that attempts to modify the <code>AmsiEnable</code> registry key.</li>
<li>The script or binary uses <code>reg.exe</code>, PowerShell, or another tool to set the <code>AmsiEnable</code> registry value to 0. The registry key location is typically <code>HKEY_USERS\&lt;SID&gt;\Software\Microsoft\Windows Script\Settings\AmsiEnable</code>.</li>
<li>After successfully disabling AMSI, the attacker proceeds to execute malicious scripts or code. These scripts may use <code>powershell.exe</code>, <code>wscript.exe</code>, or <code>cscript.exe</code>.</li>
<li>The malicious scripts download and execute additional payloads, such as malware or remote access tools (RATs).</li>
<li>The attacker performs lateral movement within the network using the compromised system as a pivot.</li>
<li>The attacker attempts to establish persistence, ensuring continued access to the system even after reboots.</li>
<li>The attacker exfiltrates sensitive data or deploys ransomware to achieve their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the <code>AmsiEnable</code> registry key allows attackers to execute malicious scripts without triggering AMSI alerts, leading to potential malware infections, data breaches, and system compromise. Disabling AMSI significantly reduces the effectiveness of endpoint security solutions, making the system more vulnerable to attack. The impact can range from individual workstation compromise to widespread network infections, depending on the attacker&rsquo;s objectives and the organization&rsquo;s security posture.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect AmsiEnable Registry Modification via Registry Events</code> to your SIEM to detect modifications to the <code>AmsiEnable</code> registry key.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function.</li>
<li>Monitor process creation events for processes modifying registry keys, especially <code>reg.exe</code> and PowerShell, using the rule <code>Detect AmsiEnable Registry Modification via Process Creation</code>.</li>
<li>Investigate any alerts generated by these rules promptly to determine if the activity is malicious or legitimate.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted scripts and binaries.</li>
<li>Harden systems by restricting user permissions to modify critical registry keys.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>amsi</category><category>registry</category><category>windows</category></item><item><title>Microsoft Office 'Office Test' Registry Persistence Abuse</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-test-registry-persistence/</link><pubDate>Sat, 27 Jan 2024 17:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-test-registry-persistence/</guid><description>Attackers modify the Microsoft Office 'Office Test' Registry key to achieve persistence by specifying a malicious DLL that executes upon application startup.</description><content:encoded><![CDATA[<p>The &ldquo;Office Test&rdquo; registry key, located under <code>HKCU\Software\Microsoft\Office Test\Special\Perf</code>, is a legitimate feature that allows specifying a DLL to be executed every time an MS Office application is started. Attackers can abuse this functionality by modifying the registry to point to a malicious DLL, achieving persistence on a compromised host. This allows for continued malicious activity even after a system restart or user logout. Elastic has published a rule to detect this behavior. The modification of this registry key, excluding deletions, is a strong indicator of potential abuse, and can be detected via endpoint detection and response (EDR) solutions as well as traditional Sysmon logging.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, often through phishing or exploiting a vulnerability.</li>
<li>The attacker establishes a foothold and escalates privileges to make necessary registry modifications.</li>
<li>The attacker modifies the <code>HKCU\Software\Microsoft\Office Test\Special\Perf</code> registry key, adding a new entry or modifying an existing one to point to a malicious DLL.</li>
<li>The attacker ensures the malicious DLL is present on the system, either by dropping it directly or using existing system tools to download it.</li>
<li>A user launches a Microsoft Office application (e.g., Word, Excel, PowerPoint).</li>
<li>The Office application loads the DLL specified in the &ldquo;Office Test&rdquo; registry key during startup.</li>
<li>The malicious DLL executes its payload, which could include establishing a reverse shell, installing malware, or exfiltrating data.</li>
<li>The attacker maintains persistence, allowing them to regain access to the system each time an Office application is started.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to a compromised system. The injected DLL can be used to execute arbitrary code, potentially leading to data theft, malware installation, or further compromise of the network. The relatively low risk score suggests a common technique, but the potential for persistent access makes it a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM and tune for your environment to detect unauthorized modifications to the &ldquo;Office Test&rdquo; registry key (<code>HKCU\Software\Microsoft\Office Test\Special\Perf\*</code>).</li>
<li>Enable Sysmon Registry event logging to capture registry modifications and activate the Sigma rule above.</li>
<li>Monitor process execution logs for Office applications to detect if a suspicious DLL has been loaded or executed, as described in the investigation guide.</li>
<li>Implement enhanced monitoring and alerting for similar registry modifications across the network, as described in the remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>registry</category><category>windows</category></item><item><title>PowerShell Script Block Logging Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-disable-powershell-scriptblock-logging/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-disable-powershell-scriptblock-logging/</guid><description>Attackers may disable PowerShell Script Block Logging by modifying the registry to conceal their activities on the host and evade detection by setting the `EnableScriptBlockLogging` registry value to 0, impacting security monitoring and incident response capabilities.</description><content:encoded><![CDATA[<p>Attackers frequently disable PowerShell Script Block Logging to evade detection and hide malicious activities on compromised systems. By modifying the <code>EnableScriptBlockLogging</code> registry value to &lsquo;0&rsquo; or &lsquo;0x00000000&rsquo;, adversaries can significantly reduce the visibility into their PowerShell-based attacks. This technique is particularly effective when followed by script-driven activity, making it harder for security teams to identify and respond to threats. This behavior has been observed across multiple environments, including those utilizing endpoint detection and response solutions such as Elastic Defend, Microsoft Defender XDR, SentinelOne, and CrowdStrike. The rule was last updated on 2026-05-04 and is designed to detect these specific registry modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to a Windows system, possibly through phishing or exploitation of a vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker may attempt to escalate privileges to gain necessary permissions to modify the registry.</li>
<li><strong>Defense Evasion:</strong> The attacker modifies the registry to disable PowerShell Script Block Logging by setting <code>HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging\EnableScriptBlockLogging</code> to 0 or 0x00000000 using <code>reg.exe</code> or PowerShell itself.</li>
<li><strong>Execution:</strong> The attacker executes malicious PowerShell scripts, leveraging the disabled logging to avoid detection. These scripts may be used for reconnaissance, lateral movement, or data exfiltration.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence using various techniques, such as creating scheduled tasks or modifying registry keys to ensure continued access to the system.</li>
<li><strong>Command and Control:</strong> The attacker establishes a command and control channel to communicate with the compromised system and issue further instructions.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally to other systems on the network, compromising additional assets.</li>
<li><strong>Impact:</strong> The attacker achieves their final objective, such as data theft, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of PowerShell Script Block Logging can severely hinder incident response efforts, allowing attackers to operate undetected for extended periods. Organizations may experience data breaches, financial losses, and reputational damage. The impact can be widespread as attackers leverage compromised systems for lateral movement and further exploitation. The loss of PowerShell logging can blind security teams, making it difficult to reconstruct attacker actions and contain the breach.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>PowerShell_Script_Block_Logging_Disabled</code> to your SIEM to detect registry modifications that disable PowerShell Script Block Logging.</li>
<li>Monitor registry events for changes to the <code>EnableScriptBlockLogging</code> value, focusing on events with <code>registry.data.strings</code> set to &ldquo;0&rdquo; or &ldquo;0x00000000&rdquo; (see rule <code>PowerShell_Script_Block_Logging_Disabled</code>).</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the Sigma rules to function effectively (see references).</li>
<li>Review and harden PowerShell execution policies to prevent unauthorized script execution (related to tactic TA0005).</li>
<li>Implement strict access controls to limit who can modify registry settings related to PowerShell logging (related to tactic TA0005).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>registry</category></item><item><title>Uncommon Registry Persistence Change Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-uncommon-registry-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-uncommon-registry-persistence/</guid><description>This rule detects changes to uncommon registry persistence keys on Windows systems that are not commonly used or modified by legitimate programs, which could indicate an adversary's attempt to persist in a stealthy manner by modifying registry keys for persistence, ensuring malicious code executes on startup or during specific events.</description><content:encoded><![CDATA[<p>This detection identifies unusual modifications to less commonly altered registry keys, which may indicate stealthy persistence attempts on Windows systems. Adversaries exploit registry keys for persistence, ensuring malicious code executes on startup or during specific events. The rule filters out benign changes by excluding known legitimate processes and paths, focusing on suspicious alterations. The rule focuses on changes to registry keys such as <code>HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell</code> and <code>HKEY_USERS\\*\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Run</code>. This rule is designed for data generated by Elastic Defend and also supports third-party data sources such as Sysmon. The rule was last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes code on the system, potentially using a dropper or exploit.</li>
<li>The attacker identifies uncommon registry keys suitable for persistence.</li>
<li>The attacker modifies the registry key to point to a malicious executable or script. This may involve adding a new entry or modifying an existing one.</li>
<li>The system restarts, or the user logs in, triggering the execution of the malicious code through the modified registry key.</li>
<li>The malicious code executes with the privileges of the user or system, depending on the registry key modified.</li>
<li>The attacker achieves persistence, allowing them to maintain access to the system even after restarts.</li>
<li>The attacker performs malicious activities such as data exfiltration, lateral movement, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to persistent access to the compromised system, allowing the attacker to maintain control and execute malicious activities. This can lead to data theft, system disruption, or further compromise of the network. The impact can range from a single workstation being compromised to a widespread enterprise-level breach, depending on the attacker&rsquo;s objectives and the scope of the initial compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Uncommon Registry Persistence Change&rdquo; Sigma rule to your SIEM to detect modifications to uncommon registry persistence keys and tune for your environment.</li>
<li>Enable Sysmon registry event logging to ensure the visibility required for the Sigma rule to function effectively (see references).</li>
<li>Review and tune the filter conditions in the Sigma rule to reduce false positives, specifically excluding legitimate software installations, system maintenance processes, and administrative scripts.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process responsible for the registry modification and correlating it with other suspicious activities.</li>
<li>Block execution of known malicious executables and scripts identified during the investigation to prevent further compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>registry</category><category>windows</category></item><item><title>Startup or Run Key Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-run-key-registry-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-run-key-registry-modification/</guid><description>Attackers modify registry run keys or startup keys to achieve persistence by referencing a program that executes when a user logs in or the system boots.</description><content:encoded><![CDATA[<p>Attackers often modify registry run keys to achieve persistence on a system. By adding entries to these keys, they ensure that a malicious program executes automatically whenever a user logs in. This technique allows the attacker to maintain access to the compromised system even after reboots or other interruptions. The programs added to these run keys execute under the context of the user account, inheriting its permissions. This activity is often difficult to distinguish from legitimate software installations or updates, requiring careful analysis to identify malicious intent. Elastic has observed this activity and created a detection rule to identify this behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system.</li>
<li>The attacker identifies registry run key locations for persistence.</li>
<li>The attacker modifies a registry run key (e.g., <code>HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run</code>) using tools such as <code>reg.exe</code>.</li>
<li>The attacker adds a malicious executable path to the registry key.</li>
<li>The system is restarted, or a user logs in.</li>
<li>The malicious executable is launched automatically as part of the logon process.</li>
<li>The malicious executable establishes a connection to a command-and-control server.</li>
<li>The attacker gains remote access to the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to compromised systems, enabling them to perform unauthorized activities such as data theft, lateral movement, and deployment of ransomware. While each instance may not cause immediate critical damage, the cumulative effect of multiple persistent infections across an environment can lead to significant data breaches and operational disruption. The Elastic rule attempts to minimize false positives with built-in filters for common legitimate applications and processes like <code>ctfmon.exe</code>, but tuning is required.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to detect suspicious modifications to registry run keys and tune it to filter out legitimate application updates.</li>
<li>Enable registry event logging to capture modifications made to the registry, ensuring that the Sigma rule can function correctly.</li>
<li>Investigate any alerts generated by the Sigma rule, examining the parent process of the process modifying the registry for suspicious activity.</li>
<li>Block known malicious executables and domains identified during triage to prevent further infection.</li>
<li>Use endpoint detection and response (EDR) solutions like Elastic Defend to gain enhanced visibility into endpoint activity and detect malicious behavior associated with persistence mechanisms.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>registry</category><category>runkey</category></item><item><title>Registry Persistence via AppInit DLL Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-appinit-dll-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-appinit-dll-persistence/</guid><description>Modification of the AppInit DLLs registry keys on Windows systems allows attackers to execute code in every process that loads user32.dll, establishing persistence and potentially escalating privileges.</description><content:encoded><![CDATA[<p>The AppInit DLLs mechanism allows dynamic-link libraries (DLLs) to be loaded into every process that creates a user interface (loads user32.dll) on Microsoft Windows operating systems. This mechanism is intended for customization of the user interface and behavior of Windows-based applications. However, attackers can abuse this by adding malicious DLLs to the registry locations associated with AppInit DLLs. This enables them to execute code with elevated privileges, similar to process injection, and maintain a persistent presence on the compromised machine. This technique is often used to maintain access after initial compromise. Detection focuses on registry modifications to the relevant keys, excluding known legitimate processes to minimize false positives. The referenced Elastic rule was last updated on 2026/05/04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through a vulnerability, phishing, or other means.</li>
<li>The attacker identifies the AppInit DLLs registry keys: <code>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows</code> or <code>HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Windows</code>.</li>
<li>The attacker modifies the <code>AppInit_DLLs</code> registry value to include the path to their malicious DLL.</li>
<li>The attacker&rsquo;s DLL is placed on the filesystem, typically in a location where it will persist across reboots.</li>
<li>Any new process that loads user32.dll will automatically load the attacker&rsquo;s malicious DLL.</li>
<li>The malicious DLL executes arbitrary code within the context of the newly created process.</li>
<li>The attacker can use this code execution to perform further actions, such as installing backdoors or escalating privileges.</li>
<li>The attacker maintains persistent access to the system through the malicious DLL loaded into every user interface process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code within the context of any process that loads <code>user32.dll</code>. This provides a persistent mechanism for maintaining access to the compromised system. The attacker gains code execution with elevated privileges, similar to process injection. This can lead to data theft, system compromise, or further lateral movement within the network. While no specific victim counts are mentioned, the widespread use of Windows makes this a potentially high-impact vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry modifications to the <code>AppInit_DLLs</code> value in <code>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows</code> and <code>HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Windows</code> using the &ldquo;Registry Persistence via AppInit DLL Modification&rdquo; Sigma rule.</li>
<li>Enable Sysmon registry event logging to provide the data required for the Sigma rule to function correctly.</li>
<li>Deploy the &ldquo;Registry Persistence via AppInit DLL Modification&rdquo; Sigma rule to your SIEM and tune the filter to exclude known-good DLL paths in your environment.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the parent process and the DLL being loaded.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>appinit-dlls</category><category>registry</category><category>windows</category></item><item><title>Encoded Executable Stored in the Registry</title><link>https://feed.craftedsignal.io/briefs/2024-01-encoded-executable-registry/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-encoded-executable-registry/</guid><description>This rule detects registry write modifications hiding encoded portable executables, indicative of adversary defense evasion by avoiding storing malicious content directly on disk.</description><content:encoded><![CDATA[<p>This detection identifies Windows Registry modifications used to conceal encoded portable executables, a tactic employed by adversaries to evade traditional disk-based detection mechanisms. The rule focuses on detecting registry entries with data strings that match known encoded executable patterns. This technique allows attackers to store malicious code within the registry, making it more difficult to detect using standard file-based scanning methods. The rule is designed to work with Elastic Defend, but also supports data from third-party EDR solutions, including CrowdStrike, Microsoft Defender XDR, and SentinelOne. The detection logic focuses on identifying registry entries with data resembling encoded executables.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through compromised credentials or exploiting a vulnerability).</li>
<li>The attacker uses a command-line tool, such as PowerShell or cmd.exe, to interact with the registry.</li>
<li>The attacker encodes a malicious executable using tools like <code>certutil</code> or custom encoding scripts.</li>
<li>The attacker creates or modifies a registry key using <code>reg.exe</code> or PowerShell&rsquo;s <code>Set-ItemProperty</code> cmdlet.</li>
<li>The encoded executable is written to the registry key&rsquo;s data value. The data string often starts with &ldquo;TVqQAAMAAAAEAAAA*&rdquo;.</li>
<li>The attacker uses another script or command to decode the executable from the registry.</li>
<li>The decoded executable is then executed in memory or written to disk for execution.</li>
<li>The attacker achieves their final objective, such as establishing persistence, escalating privileges, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to evade traditional disk-based security measures, enabling them to execute malicious code undetected. Attackers can use this technique to establish persistence, escalate privileges, or deploy malware, including ransomware. The rule helps defenders identify systems where this defense evasion technique is being employed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect encoded executables stored in the registry.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the provided Sigma rules.</li>
<li>Investigate any alerts triggered by the Sigma rules to determine if the registry modification is malicious.</li>
<li>Use endpoint detection and response (EDR) tools to further analyze suspicious processes associated with the registry modifications.</li>
<li>Implement application control policies to prevent the execution of unauthorized executables, even if they are decoded from the registry.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry</category><category>windows</category></item><item><title>Disabling LSA Protection via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-ppl-disable/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-ppl-disable/</guid><description>Adversaries may modify the RunAsPPL registry key to disable LSA protection, which prevents nonprotected processes from reading memory and injecting code, potentially leading to credential access.</description><content:encoded><![CDATA[<p>Local Security Authority (LSA) protection is a security feature in Windows that prevents unauthorized processes from accessing sensitive information stored in LSASS memory. This protection is enabled through the RunAsPPL registry key. Adversaries may attempt to disable LSA protection by modifying this registry key, allowing them to more easily access credentials stored in LSASS. This technique can be used as part of a broader attack to escalate privileges and move laterally within a network. The rule detects modifications to the <code>RunAsPPL</code> registry key that weaken LSA protection. This involves monitoring changes to the registry path <code>*\\SYSTEM\\*ControlSet*\\Control\\Lsa\\RunAsPPL</code> and alerting when the registry data does not contain values that enable protected LSASS modes (&ldquo;1&rdquo;, &ldquo;0x00000001&rdquo;, &ldquo;2&rdquo;, &ldquo;0x00000002&rdquo;).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker escalates privileges to an administrator account, if necessary, to gain the required permissions to modify the registry.</li>
<li>The attacker modifies the <code>RunAsPPL</code> registry key located at <code>HKLM\System\CurrentControlSet\Control\Lsa</code> (or similar path under <code>ControlSet00x</code>) to a value that disables LSA protection (e.g., setting it to 0). This is often achieved using tools like <code>reg.exe</code> or PowerShell.</li>
<li>The attacker may stage the system for a reboot to apply the registry change.</li>
<li>After the system reboots, LSASS starts without Protected Process Light (PPL) protection, allowing the attacker to access its memory.</li>
<li>The attacker uses credential dumping tools like <code>Mimikatz</code> to extract credentials from the unprotected LSASS process.</li>
<li>The attacker uses the stolen credentials to move laterally to other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of LSA protection allows attackers to easily extract credentials from LSASS memory. This can lead to widespread compromise of user and service accounts, enabling lateral movement and privilege escalation within the network. The impact could range from data breaches and financial loss to complete system compromise and disruption of critical services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to detect changes to the <code>RunAsPPL</code> registry key (Data Source: Sysmon).</li>
<li>Deploy the Sigma rule &ldquo;Disabling Lsa Protection via Registry Modification&rdquo; to your SIEM to detect malicious modifications to the <code>RunAsPPL</code> registry key.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process making the change, the user account, and any associated processes (see the &ldquo;investigation_fields&rdquo; in the source).</li>
<li>Monitor for unusual process activity after registry modifications, such as the execution of credential dumping tools (e.g., Mimikatz).</li>
<li>Regularly review and enforce the principle of least privilege to minimize the number of accounts with permissions to modify sensitive registry keys.</li>
<li>Use host isolation when unauthorized LSA-protection weakening is detected and confirmed.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>registry</category></item><item><title>Component Object Model (COM) Hijacking via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-com-hijacking/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-com-hijacking/</guid><description>Adversaries may establish persistence by executing malicious content triggered by hijacked references to COM objects through Component Object Model (COM) hijacking via registry modification on Windows systems.</description><content:encoded><![CDATA[<p>Component Object Model (COM) hijacking is a persistence and privilege escalation technique used by adversaries to execute malicious code by hijacking references to COM objects. This involves modifying specific registry keys to redirect COM object instantiation to attacker-controlled DLLs or executables. The technique is difficult to detect due to the legitimate use of COM objects by various applications and the operating system itself. This brief focuses on identifying suspicious registry modifications indicative of COM hijacking, while excluding known legitimate processes to minimize false positives. The original Elastic detection rule was published in November 2020 and last updated in May 2026, showcasing its continued relevance. This activity matters to defenders because successful COM hijacking allows attackers to execute arbitrary code with the privileges of the user or service that instantiates the hijacked COM object.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker identifies a target COM object to hijack by enumerating COM object entries in the registry.</li>
<li>The attacker modifies the <code>InprocServer32</code> or <code>LocalServer32</code> registry keys associated with the target COM object to point to a malicious DLL or executable.</li>
<li>The attacker may also modify the <code>DelegateExecute</code> registry key to control how the COM object is executed.</li>
<li>A legitimate application or service attempts to instantiate the original COM object.</li>
<li>Due to the registry modifications, the malicious DLL or executable is loaded and executed instead.</li>
<li>The malicious code performs its intended actions, such as establishing persistence, escalating privileges, or executing arbitrary commands.</li>
<li>The attacker maintains persistent access to the system and potentially gains elevated privileges through the hijacked COM object.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful COM hijacking enables attackers to establish persistent access to compromised systems and potentially escalate privileges. The impact can range from executing arbitrary code with user privileges to gaining system-level access, depending on the context in which the hijacked COM object is used. The Elastic detection rule aims to identify and prevent such attacks by detecting suspicious registry modifications, but the overall number of affected systems or specific sectors targeted by this technique are not specified in the original source.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Registry auditing to capture registry modification events and activate the Sigma rule <code>Suspicious COM Hijack Registry Modification</code> to detect potential COM hijacking attempts.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes modifying COM-related registry keys and their associated executables.</li>
<li>Implement code signing validation and monitor for unsigned or unexpected DLLs being loaded by legitimate processes, as indicated in the rule&rsquo;s description.</li>
<li>Regularly review and update the list of excluded processes and trusted code signers in the Sigma rule to minimize false positives.</li>
<li>Deploy the EQL rule provided by Elastic, adjusting the <code>from</code> and <code>index</code> fields to match your environment, and tune the process and signature exclusions for your environment.</li>
<li>Monitor for registry changes in <code>HKEY_USERS</code> hive related to COM objects, as these are considered less common and potentially malicious.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>com-hijacking</category><category>windows</category><category>registry</category><category>defense-evasion</category><category>privilege-escalation</category></item><item><title>Image File Execution Options (IFEO) Injection for Persistence and Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-ifeo-injection/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ifeo-injection/</guid><description>Attackers can establish persistence and evade defenses by modifying the Debugger and SilentProcessExit registry keys to perform Image File Execution Options (IFEO) injection, allowing them to intercept file executions and run malicious code.</description><content:encoded><![CDATA[<p>Image File Execution Options (IFEO) injection is a Windows feature that allows developers to debug applications by specifying an alternative executable to run. Attackers abuse this feature by modifying the Debugger and SilentProcessExit registry keys, setting a debugger to execute malicious code instead of the intended application. This technique is used to establish persistence or evade defenses. The attack involves modifying registry keys under <code>HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options</code>, <code>HKLM\\SOFTWARE\\WOW6432Node\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options</code>, <code>HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SilentProcessExit</code>, and <code>HKLM\\SOFTWARE\\WOW6432Node\\Microsoft\\Windows NT\\CurrentVersion\\SilentProcessExit</code>. This matters to defenders because successful IFEO injection can allow attackers to maintain persistent access to a system and execute malicious code without detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through unspecified means (e.g., exploiting a vulnerability or using stolen credentials).</li>
<li>The attacker elevates privileges to gain administrative access, allowing modification of sensitive registry keys.</li>
<li>The attacker modifies the registry, specifically the <code>Debugger</code> or <code>MonitorProcess</code> values within the IFEO or SilentProcessExit keys for a target executable (e.g., <code>notepad.exe</code>).</li>
<li>The <code>Debugger</code> or <code>MonitorProcess</code> value is set to point to a malicious executable.</li>
<li>When the target executable is launched by a user or system process, the malicious executable is launched instead.</li>
<li>The malicious executable performs its intended actions, such as installing malware, stealing credentials, or establishing a reverse shell.</li>
<li>The attacker maintains persistence through the IFEO injection, as the malicious executable will continue to be launched whenever the target executable is run.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful IFEO injection can allow attackers to maintain persistent access to a system, execute malicious code without detection, and potentially compromise sensitive data. IFEO injection can lead to a full compromise of the affected system, potentially impacting all users and applications on the system. This technique is often used in conjunction with other attack methods to achieve broader objectives, such as data exfiltration or ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Registry auditing to monitor changes to the IFEO and SilentProcessExit registry keys, enabling detection of unauthorized modifications.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect suspicious registry modifications related to IFEO injection.</li>
<li>Review and update the exceptions list in the Sigma rules to account for legitimate uses of the Debugger and MonitorProcess registry keys, reducing false positives.</li>
<li>Monitor process execution and correlate with registry modifications to identify potentially malicious processes launched via IFEO injection.</li>
<li>Implement enhanced monitoring and logging for registry changes related to IFEO to detect and respond to similar threats in the future.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>registry</category><category>ifeo</category><category>windows</category></item><item><title>First Time Seen Removable Device Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-first-time-usb/</link><pubDate>Tue, 02 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-first-time-usb/</guid><description>Detection of newly seen removable devices via Windows registry modification events can indicate data exfiltration attempts or initial access via malicious USB drives.</description><content:encoded><![CDATA[<p>This detection identifies the first-time appearance of removable devices on a Windows system by monitoring registry modifications. While not inherently malicious, the activity can indicate potential data exfiltration over removable media or initial access attempts using malware delivered via USB. The rule specifically looks for registry events with the &ldquo;FriendlyName&rdquo; value associated with USB storage devices (&ldquo;USBSTOR&rdquo;). This helps in identifying potentially unauthorized devices connected to the system. The detection is designed to work with data from Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user connects a removable device (e.g., USB drive) to a Windows system.</li>
<li>The operating system detects the new device and attempts to enumerate its properties.</li>
<li>The system queries the registry for device-specific settings, including the &ldquo;FriendlyName,&rdquo; under the <code>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR</code> key.</li>
<li>If the device is new to the system, the registry is modified to record the device&rsquo;s information, including its friendly name.</li>
<li>The event generates a registry modification event, which is logged by Sysmon, Elastic Defend, Microsoft Defender XDR, or SentinelOne.</li>
<li>An attacker may use the USB device to deploy malware or exfiltrate sensitive data.</li>
<li>The attacker copies files to the USB device.</li>
<li>The attacker removes the USB device, completing the exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and data exfiltration via USB can lead to the loss of sensitive information, intellectual property theft, or the introduction of malware into the network. Although this alert is low severity, multiple alerts across the environment may indicate an active campaign. The detection focuses on registry modifications, which are early indicators of device connection, allowing for proactive monitoring and response.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to detect registry modifications related to USB devices and activate the Sigma rules below.</li>
<li>Deploy the Sigma rules provided to your SIEM to detect and monitor first-time seen USB devices.</li>
<li>Investigate any alerts generated by the Sigma rules, correlating with user activity and file access events.</li>
<li>Maintain a list of approved USB devices and create exceptions for them in the monitoring system to reduce false positives as described in the rule documentation.</li>
<li>Monitor for subsequent file access or transfer events involving the new device as described in the rule documentation.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>initial-access</category><category>exfiltration</category><category>windows</category><category>registry</category><category>usb</category></item><item><title>MS Office Macro Security Registry Modifications</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-macro-security-regmod/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-macro-security-regmod/</guid><description>Attackers may modify Microsoft Office registry settings related to macro security (AccessVBOM, VbaWarnings) to disable security warnings, enabling malicious macros for persistence and further compromise.</description><content:encoded><![CDATA[<p>Microsoft Office applications allow users and developers to manage macro security settings. Attackers can abuse these settings by modifying the registry to automatically trust macros or disable security warnings. This increases the likelihood of successful macro execution, potentially establishing persistence or enabling further malicious activities on the compromised system. The modifications specifically target the <code>AccessVBOM</code> and <code>VbaWarnings</code> registry values. This is a common tactic used to bypass security controls and execute malicious code within an organization, often as part of a phishing or spear phishing campaign.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious Office document containing VBA macros.</li>
<li>The victim receives the malicious document via email or other means (T1566).</li>
<li>The victim opens the document, potentially triggering a prompt to enable macros.</li>
<li>If macros are enabled or trusted due to existing settings, the malicious VBA code executes (T1204.002).</li>
<li>The VBA code modifies the Windows Registry to disable macro security warnings by setting <code>HKEY_CURRENT_USER\Software\Microsoft\Office\*\Security\VbaWarnings</code> to 1 or modifying <code>AccessVBOM</code> (T1112).</li>
<li>The attacker can then use the trusted macro environment to execute arbitrary code (T1059.005).</li>
<li>The attacker may establish persistence by creating scheduled tasks or modifying startup entries (T1547.001).</li>
<li>The attacker achieves their final objective, which may include data exfiltration, lateral movement, or deploying ransomware (TA0005, TA0002).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass Office macro security protections, potentially leading to arbitrary code execution and system compromise. Disabling macro security warnings increases the attack surface within an organization, as users are no longer prompted to approve macro execution, which can lead to further malware infection and data breaches. The rule is designed to detect registry changes that could enable this type of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to detect the registry modifications described in this brief to trigger the detections (Sysmon Registry Events).</li>
<li>Deploy the Sigma rule &ldquo;MS Office Macro Security Registry Modifications&rdquo; to your SIEM and tune for your environment.</li>
<li>Use Group Policy Objects (GPOs) to centrally manage Office macro security settings and prevent users from modifying them (references).</li>
<li>Investigate any alerts generated by this rule to determine the source of the registry modification and whether malicious macros were subsequently executed (rule description).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>office</category><category>macro</category><category>registry</category><category>defense-evasion</category><category>windows</category></item></channel></rss>