262. That's How Adversaries Disable Warning Messages

Hello everyone!

Let's look at another interesting Modify Registry (T1112) example. This time it's related to warning messages, which may trigger the victim.

According to this report on CountLoader, the malware changes the registry value for "MaxScriptStatements" under: "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\Styles\\" to "10000000".

Doing this, the adversary likely attempts to bypass warning messages thrown by MSHTA when long scripts are executed.

At the same time, for us - it's another hunting opportunity:

event_type: "registryvaluesetwin"

AND

reg_key_path: "MaxScriptStatements"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge