370. Adversaries Disable UAC Prompts for Administrator Accounts
Hello everyone!
Today we’re going to look at another interesting example of the Modify Registry (T1112) technique, this time in the context of the Defense Evasion tactic.
So, today’s example comes from an activity cluster known as KONNI. The malware used by the attacker modified the following registry parameter:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin
This parameter defines how Windows requests confirmation for privilege elevation for administrators. Of course, the attackers change its value to “0”, which allows privilege elevation to occur without any confirmation.
Therefore, it may be a good idea to look for suspicious events related to modification of this parameter:
event_type: "registryvaluesetwin"
AND
reg_key_path: "consentpromptbehavioradmin"
AND
reg_value_data: "0x00000000"
By the way, the report we’re discussing is yet another example of how attackers are abusing AI to develop malware and tools!
See you soon!

Comments
Post a Comment