<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Software-Discovery — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/software-discovery/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/software-discovery/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Software Discovery via PowerShell Registry Queries</title><link>https://feed.craftedsignal.io/briefs/2024-01-windows-software-discovery/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-windows-software-discovery/</guid><description>Attackers use PowerShell to query the Windows registry's Uninstall key to discover installed software and identify potential vulnerabilities for exploitation.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging PowerShell to enumerate installed software on compromised systems. By querying the <code>Uninstall</code> registry key, adversaries can quickly gather detailed information about installed applications, including version numbers and patch levels. This information can then be used to identify vulnerable software and prioritize targets for further exploitation. This activity is often observed post-compromise as part of the reconnaissance phase. The detection is based on PowerShell script block logging (Event ID 4104) and focuses on identifying specific script content related to <code>Get-ItemProperty</code> and the <code>Uninstall</code> key. This technique allows attackers to efficiently map out the software landscape of a target environment, increasing the likelihood of successful exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a public-facing vulnerability.</li>
<li>The attacker executes PowerShell with a command designed to query the <code>Uninstall</code> registry key.</li>
<li>The PowerShell script uses <code>Get-ItemProperty</code> to retrieve information about installed software from the <code>HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall</code> or <code>HKCU:\Software\Microsoft\Windows\CurrentVersion\Uninstall</code> registry hives.</li>
<li>The script iterates through the registry entries, extracting details such as software name, version, and installation path.</li>
<li>The collected information is formatted and stored in a variable for later use.</li>
<li>The attacker may then filter, sort, or further process the collected software inventory data to identify specific targets.</li>
<li>The attacker exfiltrates the software inventory information to a command and control (C2) server for analysis.</li>
<li>Based on the software inventory, the attacker identifies vulnerable applications and plans subsequent attacks, such as exploiting known CVEs or deploying targeted malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful software discovery allows attackers to identify and exploit vulnerabilities in installed applications. This can lead to further compromise of the system, including data theft, ransomware deployment, or lateral movement within the network. The impact can range from individual workstation compromise to widespread enterprise-level breaches, depending on the scope of the attacker&rsquo;s activities and the criticality of the targeted software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging (Event ID 4104) to provide visibility into PowerShell commands executed on endpoints.</li>
<li>Deploy the Sigma rule &ldquo;Detect Windows Software Discovery Via PowerShell&rdquo; to your SIEM to detect suspicious PowerShell registry queries targeting the <code>Uninstall</code> key.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the user accounts and systems involved in the activity.</li>
<li>Review and filter authorized management scripts identified as false positives, updating the Sigma rule to exclude them.</li>
<li>Monitor for unusual network connections originating from systems where software discovery activity has been detected.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>software-discovery</category><category>powershell</category><category>registry</category><category>reconnaissance</category></item></channel></rss>