343. Ransomware Gangs Abuse SystemSettingsAdminFlows to Evade Defenses

Hello everyone!

Today we'll look at another example of how adversaries abuse legitimate Windows executables to evade defenses.

This time it's SystemSettingsAdminFlows.exe. According to this report, DeadLock leveraged this utility to disable various features of Windows Defender:

SystemSettingsAdminFlows.exe Defender RTP 1 

SystemSettingsAdminFlows.exe Defender SpynetReporting 0 

SystemSettingsAdminFlows.exe Defender SubmitSamplesConsent 0 

SystemSettingsAdminFlows.exe Defender DisableEnhancedNotifications 1

The commands disable Real-Time Protection (RTP) and cloud-based protections, stops the machine from sending threat reports to Microsoft, and prevent Windows Defender from automatically submitting suspicious files for analysis.

Worth a query, isn't it?

event_type: "processcreatewin"

AND

proc_file_path: "systemsettingsadminflows.exe"

AND

cmdline: "defender"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge