Potential Defense Evasion via Filter Manager (fltMC.exe)
Adversaries may abuse the Filter Manager Control Program (fltMC.exe) to unload filter drivers, thereby evading security software defenses such as malware detection and file system monitoring.
The Filter Manager Control Program (fltMC.exe) is a Windows utility used to manage filter drivers, also known as minifilters. These minifilters are leveraged by various security products, including EDR, antivirus solutions, and data loss prevention tools, to intercept and modify I/O requests. Attackers can abuse fltMC.exe to unload these minifilters, effectively disabling or circumventing the security measures they provide. This allows malicious actors to operate without detection, potentially leading to data breaches, malware infections, or other harmful activities. This technique has been observed being used to disable security products such as Bitdefender, SentinelOne and ManageEngine Endpoint Central.
Attack Chain
- Attacker gains initial access to the target system (e.g., via compromised credentials or exploit).
- Attacker executes
fltMC.exewith administrative privileges. fltMC.exeattempts to unload a specific filter driver (minifilter).- The operating system processes the request to unload the specified filter driver.
- If successful, the targeted minifilter is removed from the active filter stack.
- Security software relying on the unloaded minifilter ceases to function correctly, leaving a security gap.
- Attacker performs malicious actions, such as deploying malware or exfiltrating sensitive data, without the protection of the disabled filter driver.
- Attacker achieves their objective, such as data theft or system compromise.
Impact
Successful exploitation allows attackers to disable or circumvent security controls, increasing the likelihood of successful malware infections, data breaches, and other malicious activities. The scope of impact depends on the specific filter driver unloaded and the security products it supports. Disabling a critical EDR minifilter could leave the entire system vulnerable, while disabling a less critical filter might only impact a subset of security features.
Recommendation
- Monitor process creation events for the execution of
fltMC.exewith theunloadargument to identify potential evasion attempts (see Sigma rule “Potential Evasion via Filter Manager”). - Investigate any instances of
fltMC.exeexecution where the parent process is not a known and trusted system management tool. - Implement strict access controls to limit the ability of users to execute
fltMC.exeor modify filter driver configurations. - Review the list of exclusions in the provided EQL query to identify any legitimate software that may be generating false positives.
- Ensure that endpoint security solutions are properly configured and monitored to detect and prevent unauthorized filter driver modifications.
- Enable Sysmon process creation logging to activate the rules above.
Detection coverage 2
Potential Evasion via Filter Manager
mediumDetects attempts to unload filter drivers using fltMC.exe, potentially evading security defenses.
FltMC.exe Executed from Suspicious Process
mediumDetects fltMC.exe executed from unusual processes that may indicate malicious activity.
Detection queries are kept inside the platform. Get full rules →