<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Threat — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/threat/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/threat/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Defender Health Check Interval Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-windows-defender-health-check-modification/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-windows-defender-health-check-modification/</guid><description>This analytic detects modifications to the Windows registry, specifically targeting the `ServiceKeepAlive` value, to impair Windows Defender's ability to perform timely health checks, potentially leading to a vulnerable system state.</description><content:encoded><![CDATA[<p>Attackers may attempt to disable or delay security scans by modifying the health check interval of Windows Defender. This is achieved by altering the <code>ServiceKeepAlive</code> registry value. The modifications can prevent the timely detection of malware or other malicious activities, thereby increasing the risk to the system. The observed registry key path is <code>*\\Windows Defender\\ServiceKeepAlive</code> with the specific registry value data being <code>0x00000001</code>. This technique has been observed in the wild, as reported on X (formerly Twitter), and is also a focus of privacy-enhancing tools like privacy.sexy. This highlights the importance of monitoring registry modifications related to Windows Defender&rsquo;s configuration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes a process with elevated privileges (e.g., using <code>sudo</code> or exploiting a privilege escalation vulnerability).</li>
<li>The process modifies the Windows Registry, specifically targeting the <code>HKLM\SOFTWARE\Microsoft\Windows Defender\ServiceKeepAlive</code> key.</li>
<li>The <code>registry_value_data</code> is set to <code>0x00000001</code>, which may disable or delay health checks.</li>
<li>Windows Defender health checks are impaired, reducing the frequency or effectiveness of scans.</li>
<li>Malware or malicious activity remains undetected due to the reduced scan frequency.</li>
<li>The attacker maintains persistence and further compromises the system, potentially leading to data theft or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of Windows Defender health check intervals can lead to a significant decrease in the system&rsquo;s ability to detect and respond to threats. This can result in undetected malware infections, data breaches, and system compromise. While the number of direct victims is unknown, the widespread use of Windows Defender makes this a potentially impactful technique across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Registry Modification of Windows Defender Health Check Interval</code> to your SIEM to detect malicious registry changes.</li>
<li>Monitor <code>Sysmon EventID 13</code> events for registry modifications related to Windows Defender&rsquo;s <code>ServiceKeepAlive</code> key.</li>
<li>Investigate any alerts generated by the Sigma rule, paying close attention to the <code>dest</code> and <code>process_guid</code> fields.</li>
<li>Use the provided references to understand the context of this technique in real-world attacks.</li>
<li>Tune the provided filter macro <code>windows_impair_defense_change_win_defender_health_check_intervals_filter</code> to minimize false positives in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>windows</category><category>registry</category><category>defender</category><category>defense-evasion</category><category>threat</category></item></channel></rss>