340. Adversaries Modify the Registry to Disable Two Core Windows Security Mechanisms
Hello everyone!
I've shared some notable examples of Modify Registry (T1112) already. It's time for a few more interesting examples.
Sophos has published a great report on Red Wolf's recent activities. According to the report, the adversary modified the following registry keys:
HKLM\SYSTEM\CurrentControlSet\Control\CI\Config /v VulnerableDriverBlocklistEnable /t REG_DWORD /d 0x0 /f
HKLM\\SYSTEM\\CurrentControlSet\\Control\\DeviceGuard\\Scenarios\\HypervisorEnforcedCodeIntegrity /v Enabled /t REG_DWORD /d 0x0 /f
The first one disables vulnerable drivers blocklist, the second - Hypervisor-Enforced Code Integrity. Both are good targets for hunting, so:
event_type: "registryvaluesetwin"
AND
reg_key_path: ("VulnerableDriverBlocklistEnable" OR "HypervisorEnforcedCodeIntegrity")
AND
reg_value_data: "0x00000000"
See you tomorrow!

Comments
Post a Comment