<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Usb — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/usb/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/usb/feed.xml" rel="self" type="application/rss+xml"/><item><title>First Time Seen Removable Device Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-first-time-usb/</link><pubDate>Tue, 02 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-first-time-usb/</guid><description>Detection of newly seen removable devices via Windows registry modification events can indicate data exfiltration attempts or initial access via malicious USB drives.</description><content:encoded><![CDATA[<p>This detection identifies the first-time appearance of removable devices on a Windows system by monitoring registry modifications. While not inherently malicious, the activity can indicate potential data exfiltration over removable media or initial access attempts using malware delivered via USB. The rule specifically looks for registry events with the &ldquo;FriendlyName&rdquo; value associated with USB storage devices (&ldquo;USBSTOR&rdquo;). This helps in identifying potentially unauthorized devices connected to the system. The detection is designed to work with data from Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user connects a removable device (e.g., USB drive) to a Windows system.</li>
<li>The operating system detects the new device and attempts to enumerate its properties.</li>
<li>The system queries the registry for device-specific settings, including the &ldquo;FriendlyName,&rdquo; under the <code>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR</code> key.</li>
<li>If the device is new to the system, the registry is modified to record the device&rsquo;s information, including its friendly name.</li>
<li>The event generates a registry modification event, which is logged by Sysmon, Elastic Defend, Microsoft Defender XDR, or SentinelOne.</li>
<li>An attacker may use the USB device to deploy malware or exfiltrate sensitive data.</li>
<li>The attacker copies files to the USB device.</li>
<li>The attacker removes the USB device, completing the exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and data exfiltration via USB can lead to the loss of sensitive information, intellectual property theft, or the introduction of malware into the network. Although this alert is low severity, multiple alerts across the environment may indicate an active campaign. The detection focuses on registry modifications, which are early indicators of device connection, allowing for proactive monitoring and response.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to detect registry modifications related to USB devices and activate the Sigma rules below.</li>
<li>Deploy the Sigma rules provided to your SIEM to detect and monitor first-time seen USB devices.</li>
<li>Investigate any alerts generated by the Sigma rules, correlating with user activity and file access events.</li>
<li>Maintain a list of approved USB devices and create exceptions for them in the monitoring system to reduce false positives as described in the rule documentation.</li>
<li>Monitor for subsequent file access or transfer events involving the new device as described in the rule documentation.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>initial-access</category><category>exfiltration</category><category>windows</category><category>registry</category><category>usb</category></item></channel></rss>