<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Doctor Web — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/doctor-web/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/doctor-web/feed.xml" rel="self" type="application/rss+xml"/><item><title>AppLocker Registry Modification to Deny Security Software Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-applocker-security-software-deny/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-applocker-security-software-deny/</guid><description>Attackers can modify the Windows registry via AppLocker to block the execution of security software, potentially disabling defenses and allowing further malicious activities.</description><content:encoded><![CDATA[<p>Attackers can leverage AppLocker to modify the Windows registry to deny the execution of security products, effectively impairing defenses. This technique involves manipulating registry keys and values associated with AppLocker policies to block specific antivirus and security software. This activity is often associated with malware such as Azorult, which attempts to disable or bypass security measures. By successfully blocking security software, attackers can facilitate further malicious activities, such as malware installation, data exfiltration, and persistence within the compromised environment. Defenders should monitor for unusual AppLocker registry modifications that target known security product vendors to identify potential attempts to disable defenses.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system through methods such as phishing or exploiting a vulnerability.</li>
<li>Attacker elevates privileges to gain administrative access, required to modify AppLocker policies.</li>
<li>Attacker modifies the registry keys associated with AppLocker policies, specifically targeting the Software Restriction Policies (SRP) to deny execution of security software.</li>
<li>The attacker modifies the <code>registry_value_data</code> within <code>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\SrpV2\</code> to include Action=&ldquo;Deny&rdquo; for targeted security vendors like Symantec, McAfee, or Kaspersky.</li>
<li>AppLocker policies are updated based on the modified registry settings.</li>
<li>The targeted security software is prevented from executing, effectively disabling or impairing its functionality.</li>
<li>Attacker proceeds to install malware, exfiltrate data, or establish persistence without interference from the disabled security software.</li>
<li>The attacker achieves their final objective, such as data theft, system compromise, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a significant degradation of the security posture of the affected system. By disabling or impairing security software, attackers can bypass critical defenses and gain unfettered access to sensitive data and systems. This can lead to data breaches, financial losses, reputational damage, and disruption of business operations. The Azorult malware has been observed using this technique to disable security products.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 13 to monitor registry modifications and activate the provided Sigma rules (process_creation and registry_set).</li>
<li>Deploy the provided Sigma rules to detect AppLocker registry modifications targeting security software vendors and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rules to identify potentially malicious activity, correlating with other endpoint telemetry.</li>
<li>Review and audit AppLocker policies to ensure they are configured correctly and not being used to block legitimate security software.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>applocker</category><category>defense-evasion</category><category>registry-modification</category></item></channel></rss>