254. That's How Adversaries Modify Registry to Weaken Security
Hello everyone!
As you know, adversaries may solve lots of problems via interacting with registry. So today we'll look at another few examples of Modify Registry (T1112).
And one more time it's going to be the Gentlemen. For example, the adversary leverage reg.exe to allows unrestricted NTLM authentication:
reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0 /v RestrictSendingNTLMTraffic /t REG_DWORD /d 0 /f
And we can look for such behaviors, of course:
event_type: "processcreatewin"
AND
proc_file_path: "reg.exe"
AND
cmdline: ("add" AND "MSV1_0")
Another example is enabling Restricted Admin:
reg add HKLM\System\CurrentControlSet\Control\Lsa /t REG_DWORD /v DisableRestrictedAdmin /d 0x0 /f
Why not to hunt it:
event_type: "processcreatewin"
AND
proc_file_path: "reg.exe"
AND
cmdline: ("add" AND "DisableRestrictedAdmin")
See you tomorrow!
Comments
Post a Comment