January 2024 (30)
Windows Defender BlockAtFirstSeen Feature Disabled via Registry Modification
2 rulesAn attacker modifies the Windows Registry to disable the Windows Defender BlockAtFirstSeen feature, potentially allowing malware to bypass initial detection and increasing the risk of system compromise.
Windows Defender Disabled via Registry Modification
2 rules 1 TTPAn attacker modifies the Windows Registry key 'DisableAntiSpyware' to disable Windows Defender, a technique commonly associated with Ryuk ransomware to evade defenses.
Windows Defender Enhanced Notification Disabled via Registry Modification
2 rules 1 TTPAn attacker modifies the Windows Registry to disable Windows Defender's Enhanced Notification feature, preventing users from receiving security alerts and potentially allowing malicious activities to go unnoticed, ultimately enabling persistence and evasion.
Windows Defender Exclusion Added or Modified via Command Line
2 rulesAdversaries use Add-MpPreference or Set-MpPreference commands to add exclusions in Windows Defender, allowing malicious code to execute undetected, and this activity can be detected via Endpoint Detection and Response (EDR) agents.
Windows Defender Exclusion Registry Modification
2 rules 1 TTPAdversaries modify Windows Defender exclusion registry entries to bypass antivirus and execute malicious code undetected, potentially leading to persistence and further malicious activities.
Windows Defender Exclusions Added via PowerShell
2 rules 3 TTPsAdversaries may attempt to bypass Windows Defender's capabilities by using PowerShell to add exclusions for folders or processes, and this activity can be detected by monitoring PowerShell command lines that use `Add-MpPreference` or `Set-MpPreference` with exclusion parameters.
Windows Defender File Hash Computation Disabled via Registry Modification
2 rules 1 TTPAttackers may disable Windows Defender's ability to compute file hashes by modifying the EnableFileHashComputation registry value, impairing its malware detection capabilities.
Windows Defender Infection Reporting Disabled via Registry Modification
2 rulesAttackers modify the Windows registry to disable Windows Defender's infection reporting, preventing detailed threat information from reaching Microsoft and potentially allowing malware to evade detection.
Windows Defender Logging Disabled via Registry Modification
2 rules 1 TTPAttackers may disable Windows Defender logging by modifying specific registry keys to evade detection and conceal malicious activities.
Windows Defender MpEngine Disabled via Registry Modification
2 rules 1 TTPAn attacker modifies the Windows Defender MpEngine registry value to disable key features, potentially allowing malware to evade detection.
Windows Defender Network Protection Disabled via Registry Modification
2 rules 1 TTPThis analytic detects modifications to the Windows registry to disable Windows Defender Network Protection, potentially leaving the system vulnerable to network-based threats.
Windows Defender Phishing Filter Override via Registry Modification
2 rules 1 TTPThe analytic detects modifications to the Windows registry that disable the Windows Defender phishing filter, potentially allowing attackers to deceive users into visiting malicious websites without browser warnings.
Windows Defender Profile Registry Key Deletion
2 rules 1 TTPDetection of Windows Defender profile registry key deletion, indicating potential defense evasion by malware or threat actors aiming to disable security controls.
Windows Defender Protocol Recognition Disabled via Registry Modification
2 rules 1 TTPAn attacker modifies the Windows Registry to disable Windows Defender protocol recognition, hindering its ability to detect and respond to malware, potentially leading to successful data exfiltration or system compromise.
Windows Defender Real-time Signature Delivery Disabled via Registry Modification
2 rules 1 TTPThe following analytic detects modifications to the Windows registry that disable the Windows Defender real-time signature delivery feature, preventing timely malware definition updates and potentially leading to system compromise.
Windows Defender Reporting Disabled via Registry Modification
2 rules 1 TTPAttackers modify the Windows registry to disable Windows Defender generic reports, preventing error reports and potentially hiding malicious activity.
Windows Defender Scan On Update Disabled via Registry Modification
2 rules 1 TTPAn attacker modifies the Windows registry to disable the Windows Defender Scan On Update feature, potentially evading detection and establishing persistence.
Windows Defender Signature Retirement Disabled via Registry Modification
2 rules 1 TTPAn attacker disables Windows Defender's signature retirement feature by modifying a registry key, potentially reducing its effectiveness in detecting threats by allowing older, less relevant signatures to persist.
Windows Defender SmartScreen App Install Control Disabled via Registry Modification
2 rulesAttackers modify the Windows Registry to disable Windows Defender SmartScreen App Install Control, potentially allowing the installation of malicious web-based applications without restrictions, leading to system compromise and sensitive information exposure.
Windows Defender SmartScreen Prompt Override via Registry Modification
2 rulesAttackers modify the Windows registry to disable SmartScreen prompt overrides, potentially allowing users to bypass security warnings and execute harmful content, leading to system compromise.
Windows Defender Threat Action Modification via Registry
2 rulesAn attacker modifies the Windows Defender ThreatSeverityDefaultAction registry setting to weaken defenses, potentially leading to unaddressed threats and system compromise.
Windows Defender Throttle Rate Modification
2 rules 1 TTPAn attacker modifies the Windows Defender ThrottleDetectionEventsRate registry setting to reduce the frequency of logged detection events, potentially evading detection.
Windows Defender Tracing Level Modification
2 rulesThe following analytic detects modifications to the Windows registry specifically targeting the 'WppTracingLevel' setting within Windows Defender, potentially impairing its diagnostic capabilities and allowing attackers to evade detection.
Windows Defender Web Content Evaluation Disabled via Registry Modification
2 rulesAn attacker modifies the Windows registry to disable Windows Defender web content evaluation, potentially allowing malicious web content to bypass security checks and compromise the system.
Windows Event Logging Service Shutdown Detection
2 rules 1 TTPDetection of the Windows Event Log service shutdown, indicated by Event ID 1100, which can signify attempts to evade detection by disabling logging.
Windows EventLog ChannelAccess Registry Modification
2 rules 1 TTPAn attacker modifies the Windows EventLog ChannelAccess registry value to evade defenses by blocking security products from accessing event logs.
Windows EventLog Security Descriptor Tampering
2 rules 1 TTPThis analytic detects suspicious modifications to the EventLog security descriptor registry value, specifically the 'CustomSD' value, within the registry path 'HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Eventlog\<Channel>\CustomSD', which can be used for defense evasion by attackers.
Windows Files and Dirs Access Rights Modification via Icacls
2 rules 1 TTPDetection of icacls.exe, cacls.exe, or xcacls.exe being used to modify file or directory permissions, often used by APTs and coinminers for defense evasion and persistence.
Windows Filtering Platform Policy Added to Block EDR Process
2 rules 1 TTPAttackers modify the Windows Filtering Platform (WFP) policy to block the communication of endpoint detection and response (EDR) processes, impairing their functionality and hindering detection of malicious activities.
Windows Firewall Disabled via PowerShell
2 rules 2 TTPsAttackers may disable the Windows firewall or its rules using the `Set-NetFirewallProfile` PowerShell cmdlet to enable lateral movement and command and control activity.