284. That's How WhatsApp Worm Disables UAC

Hello everyone!

How often do you see adversaries leverage Spearphishing via Service (T1566.003)? Not very often, right? So let's look at an example.

We'll look into a report on WhatsApp Worm. Yes, the threat actors distributed malicious files, in this case ZIP archives with LNK, via WhatsApp. The LNK file contained an obfuscated command to download and run the second stage.

Let's look how this stage disables UAC. The following command is used to achieve this goal:

powershell -WindowStyle Hidden -ArgumentList "-Command Set-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' -Name 'EnableLUA' -Value 0 -Force"

Such activity is quite suspicious and definitely worth a query:

event_type: "registryvaluesetwin"

AND

reg_key_path: "enablelua"

AND

reg_value_data: "0x00000000"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge