254. That's How Adversaries Modify Registry to Weaken Security

Hello everyone!

As you know, adversaries may solve lots of problems via interacting with registry. So today we'll look at another few examples of Modify Registry (T1112).

And one more time it's going to be the Gentlemen. For example, the adversary leverage reg.exe to allows unrestricted NTLM authentication:

reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0 /v RestrictSendingNTLMTraffic /t REG_DWORD /d 0 /f

And we can look for such behaviors, of course:

event_type: "processcreatewin"

AND

proc_file_path: "reg.exe"

AND

cmdline: ("add" AND "MSV1_0")

Another example is enabling Restricted Admin:

reg add HKLM\System\CurrentControlSet\Control\Lsa /t REG_DWORD /v DisableRestrictedAdmin /d 0x0 /f

Why not to hunt it:

event_type: "processcreatewin"

AND

proc_file_path: "reg.exe"

AND

cmdline: ("add" AND "DisableRestrictedAdmin")

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge