MpCmdRun Execution with RemoveDefinitions Argument
The execution of MpCmdRun.exe with the '-RemoveDefinitions' argument, used to remove definitions from the Windows Malware Protection Engine, can indicate potential malware activity or attempts to bypass security measures.
The threat involves the use of MpCmdRun.exe, the command-line interface for Windows Defender, with the -RemoveDefinitions argument. This command is designed to remove existing malware definitions from the Windows Malware Protection Engine. While legitimate use cases exist, its execution can also be indicative of malicious activity aimed at disabling or weakening endpoint security controls. An attacker or malware may use this command to bypass detection after gaining initial access. This technique is particularly concerning because it can leave systems vulnerable to known threats by deleting the corresponding definitions.
Attack Chain
- Initial Access: The attacker gains initial access to the system, possibly through phishing, exploitation of a vulnerability, or compromised credentials.
- Privilege Escalation: The attacker escalates privileges to execute commands with administrative rights, necessary to manipulate Windows Defender.
- Defense Evasion: The attacker executes
MpCmdRun.exewith the-RemoveDefinitionsargument. - Definition Removal: Windows Defender removes the existing malware definitions, weakening the system’s ability to detect and prevent known threats.
- Malware Deployment: The attacker deploys malware or performs malicious activities, now with a reduced chance of being detected by Windows Defender.
- Lateral Movement: The attacker uses the compromised system to move laterally within the network, infecting other machines.
- Data Exfiltration/Ransomware Deployment: The attacker exfiltrates sensitive data or deploys ransomware, leveraging the weakened security posture of the compromised systems.
Impact
Successful execution of this attack can severely compromise endpoint security. By removing malware definitions, the attacker effectively blinds Windows Defender to known threats. This can lead to successful malware infections, data breaches, ransomware deployment, and overall system instability. If widely deployed across an organization, the impact could affect hundreds or thousands of endpoints, causing significant financial and operational damage.
Recommendation
- Deploy the Sigma rule
MpCmdRun RemoveDefinitions Executionto your SIEM and tune for your environment to detect the execution ofMpCmdRun.exewith the-RemoveDefinitionsargument. - Investigate any instances of
MpCmdRun.exeexecuting with the-RemoveDefinitionsargument to determine if the behavior is legitimate or malicious, based on thereferenceslink to Ukraine CERT advisory. - Implement strict access controls to limit the ability to execute
MpCmdRun.exeand other security-related tools. - Monitor process execution logs (Sysmon EventID 1, Windows Event Log Security 4688, CrowdStrike ProcessRollup2) for unusual activity related to Windows Defender and other security software.
Detection coverage 2
MpCmdRun RemoveDefinitions Execution
highDetects the execution of MpCmdRun.exe with the -RemoveDefinitions argument, which can be used to remove definitions from the Windows Malware Protection Engine.
Suspicious Parent Process of MpCmdRun
mediumDetects MpCmdRun.exe being executed by a suspicious parent process.
Detection queries are kept inside the platform. Get full rules →