LOLBAS/yml/OSBinaries/SystemSettingsAdminFlow.yml

32 lines
1.8 KiB
YAML
Raw Normal View History

2025-01-19 11:06:55 +01:00
---
2025-01-19 10:25:51 +01:00
Name: SystemSettingsAdminFlow.exe
2025-01-19 11:03:08 +01:00
Description: SystemSettingsAdminFlows.exe is responsible for the administrator privileges that are required for opening/editing/removing files.
2025-01-19 10:25:51 +01:00
Author: 'Jason Phang Vern-Onn'
Created: 2025-01-19
Commands:
- Command: C:\Windows\System32\SystemSettingsFlowAdmin.exe Defender DisableEnhancedNotifications 1
2025-01-19 10:54:46 +01:00
- Command: C:\Windows\System32\SystemSettingsFlowAdmin.exe Defender SubmitSamplesConsent 0
2025-01-19 10:25:51 +01:00
- Command: C:\Windows\System32\SystemSettingsFlowAdmin.exe Defender SpynetReporting 0
2025-01-19 10:54:46 +01:00
- Command: C:\Windows\System32\SystemSettingsFlowAdmin.exe Defender RTP 1
2025-01-19 11:03:08 +01:00
Description: SystemSettingsFlowAdmin.exe can be abused to modify Windows Defender settings, such as disabling enhanced notifications, submission consent, and real-time protection.
2025-01-19 10:25:51 +01:00
Usecase: Attackers can exploit this binary to disable critical Windows Defender settings and bypass security measures, enabling malware execution.
Category: Execute
Privileges: Administrator
2025-01-19 11:03:08 +01:00
MitreID: T1562.001
2025-01-19 10:25:51 +01:00
OperatingSystem: Windows 10 1803, Windows 10 1703
Tags:
2025-01-19 11:06:55 +01:00
- Execute: EXE
2025-01-19 10:25:51 +01:00
Full_Path:
- Path: C:\Windows\System32\SystemSettingsFlowAdmin.exe
- Path: C:\Windows\Syswow64\SystemSettingsFlowAdmin.exe
Detection:
2025-01-19 11:13:34 +01:00
- IOC: Microsoft-Windows-Windows Defender/Operational Event Log Event ID 5007 for changes
2025-01-19 10:54:46 +01:00
- IOC: SystemSettingsFlowAdmin.exe spawned with parent image not SystemSettings.exe
2025-01-19 10:25:51 +01:00
- Sigma: https://gist.githubusercontent.com/ald3n5/b1a3f4138b1a1624f7e183a3d0859d17/raw/29e6f67fa3920a39cb4c4bc5226f21a6057fa5ad/susp_adminflows_tampering_defender.yml
Resources:
- Link: https://www.huntress.com/blog/lolbin-to-inc-ransomware
2025-01-19 11:03:08 +01:00
- Link: https://www.huntress.com/blog/its-not-safe-to-pay-safepay
2025-01-19 10:25:51 +01:00
Acknowledgement:
2025-01-19 11:03:08 +01:00
- Person: Alden Schmidt
2025-01-19 11:06:55 +01:00
- Person: Matt Anderson