370. Adversaries Disable UAC Prompts for Administrator Accounts

Hello everyone!

Today we’re going to look at another interesting example of the Modify Registry (T1112) technique, this time in the context of the Defense Evasion tactic.

So, today’s example comes from an activity cluster known as KONNI. The malware used by the attacker modified the following registry parameter:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin

This parameter defines how Windows requests confirmation for privilege elevation for administrators. Of course, the attackers change its value to “0”, which allows privilege elevation to occur without any confirmation.

Therefore, it may be a good idea to look for suspicious events related to modification of this parameter:

event_type: "registryvaluesetwin"

AND

reg_key_path: "consentpromptbehavioradmin"

AND

reg_value_data: "0x00000000"

By the way, the report we’re discussing is yet another example of how attackers are abusing AI to develop malware and tools!

See you soon!

Comments

Popular posts from this blog

082. Huniting for Malicious Browser Extensions

033. Free Google Threat Intelligence Course

068. Detecting RMMs from Ransomware Affiliate's Toolkit: MeshAgent