340. Adversaries Modify the Registry to Disable Two Core Windows Security Mechanisms

Hello everyone!

I've shared some notable examples of Modify Registry (T1112) already. It's time for a few more interesting examples.

Sophos has published a great report on Red Wolf's recent activities. According to the report, the adversary modified the following registry keys:

HKLM\SYSTEM\CurrentControlSet\Control\CI\Config /v VulnerableDriverBlocklistEnable /t REG_DWORD /d 0x0 /f

HKLM\\SYSTEM\\CurrentControlSet\\Control\\DeviceGuard\\Scenarios\\HypervisorEnforcedCodeIntegrity /v Enabled /t REG_DWORD /d 0x0 /f

The first one disables vulnerable drivers blocklist, the second - Hypervisor-Enforced Code Integrity. Both are good targets for hunting, so:

event_type: "registryvaluesetwin"

AND

reg_key_path: ("VulnerableDriverBlocklistEnable" OR "HypervisorEnforcedCodeIntegrity")

AND

reg_value_data: "0x00000000"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge