343. Ransomware Gangs Abuse SystemSettingsAdminFlows to Evade Defenses
Hello everyone!
Today we'll look at another example of how adversaries abuse legitimate Windows executables to evade defenses.
This time it's SystemSettingsAdminFlows.exe. According to this report, DeadLock leveraged this utility to disable various features of Windows Defender:
SystemSettingsAdminFlows.exe Defender RTP 1
SystemSettingsAdminFlows.exe Defender SpynetReporting 0
SystemSettingsAdminFlows.exe Defender SubmitSamplesConsent 0
SystemSettingsAdminFlows.exe Defender DisableEnhancedNotifications 1
The commands disable Real-Time Protection (RTP) and cloud-based protections, stops the machine from sending threat reports to Microsoft, and prevent Windows Defender from automatically submitting suspicious files for analysis.
Worth a query, isn't it?
event_type: "processcreatewin"
AND
proc_file_path: "systemsettingsadminflows.exe"
AND
cmdline: "defender"
See you tomorrow!

Comments
Post a Comment