<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Windows-Registry — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/windows-registry/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/windows-registry/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Defender Signature Retirement Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-win-defender-signature-retirement/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-win-defender-signature-retirement/</guid><description>An attacker disables Windows Defender's signature retirement feature by modifying a registry key, potentially reducing its effectiveness in detecting threats by allowing older, less relevant signatures to persist.</description><content:encoded><![CDATA[<p>Attackers may attempt to disable Windows Defender&rsquo;s signature retirement mechanism to weaken the endpoint protection. This is achieved by modifying the <code>DisableSignatureRetirement</code> registry value. Disabling signature retirement can prevent Windows Defender from removing outdated antivirus signatures, potentially reducing its effectiveness in detecting threats. Attackers may use this technique to evade detection by ensuring older, less effective signatures remain active, thereby reducing the likelihood of detecting their malicious activities. The tactic is used as part of defense evasion strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through unspecified means.</li>
<li>The attacker elevates privileges to obtain the necessary permissions to modify the Windows Registry.</li>
<li>The attacker uses a command-line tool like <code>reg.exe</code> or PowerShell to modify the registry.</li>
<li>The attacker targets the specific registry key: <code>HKLM\SOFTWARE\Microsoft\Windows Defender\NIS\Consumers\IPS</code>.</li>
<li>The attacker modifies the <code>DisableSignatureRetirement</code> registry value.</li>
<li>The attacker sets the <code>DisableSignatureRetirement</code> value to <code>0x00000001</code> to disable the signature retirement feature.</li>
<li>Windows Defender continues to use outdated signatures, which may be less effective against modern threats.</li>
<li>The attacker executes malicious code, evading detection due to the weakened signature database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling Windows Defender&rsquo;s signature retirement feature weakens the system&rsquo;s security posture. This allows outdated and less effective signatures to remain active, potentially leading to missed detections of newer threats. Successfully exploiting this vulnerability allows attackers to operate with reduced risk of detection, potentially leading to data breaches, malware infections, and other security incidents. The impact can affect individual endpoints as well as entire organizations relying on Windows Defender for primary threat protection.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect modifications to the <code>DisableSignatureRetirement</code> registry value (see rules).</li>
<li>Monitor Windows Registry events for unauthorized modifications to Windows Defender settings, specifically Event ID 13 from Sysmon (see rules and data_source).</li>
<li>Investigate any detected instances of <code>DisableSignatureRetirement</code> being set to <code>0x00000001</code> (see rules).</li>
<li>Implement strict access controls to prevent unauthorized modification of registry settings related to Windows Defender.</li>
<li>Tune the provided filter macro <code>windows_impair_defense_disable_win_defender_signature_retirement_filter</code> to reduce false positives in your environment (see search).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows-registry</category><category>windows-defender</category></item><item><title>Windows Defender Network Protection Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-disable-win-defender-network-protection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-disable-win-defender-network-protection/</guid><description>This analytic detects modifications to the Windows registry to disable Windows Defender Network Protection, potentially leaving the system vulnerable to network-based threats.</description><content:encoded><![CDATA[<p>This detection identifies attempts to weaken Windows security by disabling Windows Defender Network Protection. The technique involves modifying the <code>EnableNetworkProtection</code> registry entry, a critical component for preventing network-based threats. Attackers may employ this tactic to bypass security measures, enabling unauthorized access, data exfiltration, or further compromise of the network. This is often a post-exploitation step or part of a larger defense evasion strategy. The detection focuses on changes to the specific registry key and value associated with disabling the protection feature.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>Attacker elevates privileges to gain administrative access, which is required to modify the registry.</li>
<li>The attacker uses a script or tool (e.g., PowerShell, <code>reg.exe</code>) to modify the registry.</li>
<li>The script targets the registry key <code>*\\Windows Defender\\Windows Defender Exploit Guard\\Network Protection\\EnableNetworkProtection</code>.</li>
<li>The script sets the <code>registry_value_data</code> to <code>0x00000000</code>, which disables Network Protection.</li>
<li>Windows Defender Network Protection is disabled, allowing network-based threats to proceed unimpeded.</li>
<li>The attacker can then execute malicious code, establish command and control, or exfiltrate data without network-level interference from Windows Defender.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of Windows Defender Network Protection can significantly weaken a system&rsquo;s security posture. This allows attackers to bypass a key security control, potentially leading to malware infection, data theft, or complete system compromise. Systems without Network Protection are more susceptible to network-based attacks such as drive-by downloads, exploit kits, and command-and-control traffic. The impact could range from a single compromised workstation to a widespread network breach, depending on the attacker&rsquo;s objectives and capabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Registry Modification to Disable Windows Defender Network Protection</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the registry modification.</li>
<li>Implement endpoint detection and response (EDR) solutions to provide additional visibility into endpoint activity and detect malicious behavior.</li>
<li>Review and enforce group policies to prevent unauthorized registry modifications.</li>
<li>Monitor Sysmon EventID 13 for registry modifications to detect similar defense evasion attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>privilege-escalation</category><category>windows-registry</category></item><item><title>Windows Defender Quick Scan Interval Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-win-defender-quick-scan-interval/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-win-defender-quick-scan-interval/</guid><description>Detection of modifications to the Windows registry that change the Windows Defender Quick Scan Interval, potentially impairing its ability to detect malware promptly.</description><content:encoded><![CDATA[<p>This threat brief focuses on the modification of the Windows Defender Quick Scan Interval, a critical setting that dictates how frequently quick scans are performed. Attackers may attempt to modify this interval to significantly reduce the frequency of scans, creating a window of opportunity to deploy malware or conduct malicious activities without being detected by Windows Defender&rsquo;s default quick scans. This technique is a form of defense evasion, allowing threats to persist undetected on compromised systems. The activity is detected through monitoring of registry modifications related to the &ldquo;QuickScanInterval&rdquo; path within the Windows registry. Disabling or significantly increasing this interval can have severe consequences, potentially leading to widespread infection and data compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to the system through various means, such as exploiting a software vulnerability, or social engineering.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges to gain the necessary permissions to modify the Windows Registry, often using techniques like exploiting system vulnerabilities or leveraging misconfigured access controls.</li>
<li><strong>Defense Evasion:</strong> The attacker attempts to disable or modify the Windows Defender Quick Scan Interval to prevent detection of malicious activities.</li>
<li><strong>Registry Modification:</strong> The attacker modifies the &ldquo;QuickScanInterval&rdquo; registry value using tools such as <code>reg.exe</code> or PowerShell. The specific registry path targeted is <code>*\Windows Defender\Scan\QuickScanInterval</code>.</li>
<li><strong>Persistence:</strong> By disabling or extending the quick scan interval, the attacker ensures their malware or malicious activities can persist on the system without being detected by regular quick scans.</li>
<li><strong>Malware Deployment:</strong> With Windows Defender&rsquo;s quick scans effectively neutered, the attacker deploys additional malware or executes malicious scripts on the compromised system.</li>
<li><strong>Lateral Movement:</strong> The attacker leverages the compromised system to move laterally within the network, infecting other systems and expanding their foothold.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the Windows Defender Quick Scan Interval can lead to a significant reduction in the system&rsquo;s ability to detect malware promptly. This can result in widespread infection, data breaches, and system compromise. The consequences include potential financial losses, reputational damage, and disruption of business operations. While the exact number of victims is difficult to quantify, the potential impact is significant, especially within organizations heavily reliant on Windows Defender as their primary security solution.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 13 logging to monitor registry modifications as described in the data source of the detection search.</li>
<li>Deploy the provided Splunk search to identify modifications to the Windows Defender Quick Scan Interval.</li>
<li>Investigate any detected modifications to the <code>QuickScanInterval</code> registry path to determine if they are legitimate or malicious.</li>
<li>Tune the provided filter macro <code>windows_impair_defense_change_win_defender_quick_scan_interval_filter</code> to reduce false positives in your environment.</li>
<li>Monitor for processes modifying the registry key <code>*\Windows Defender\Scan\QuickScanInterval</code> using tools like <code>reg.exe</code> or PowerShell.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows-registry</category><category>windows-defender</category><category>endpoint</category></item></channel></rss>