Skip to content
Threat Feed

January 2024 (30)

high threat

Windows Defender BlockAtFirstSeen Feature Disabled via Registry Modification

An attacker modifies the Windows Registry to disable the Windows Defender BlockAtFirstSeen feature, potentially allowing malware to bypass initial detection and increasing the risk of system compromise.

exploited Windows Defender +3 registry_modification defender blockatfirstseen
2r
high threat

Windows Defender Disabled via Registry Modification

An attacker modifies the Windows Registry key 'DisableAntiSpyware' to disable Windows Defender, a technique commonly associated with Ryuk ransomware to evade defenses.

Windows Defender +3 Ryuk defense-evasion registry-modification ransomware windows
2r 1t
high advisory

Windows Defender Enhanced Notification Disabled via Registry Modification

An attacker modifies the Windows Registry to disable Windows Defender's Enhanced Notification feature, preventing users from receiving security alerts and potentially allowing malicious activities to go unnoticed, ultimately enabling persistence and evasion.

Windows Defender +3 registry-modification windows-defender persistence evasion
2r 1t
high advisory

Windows Defender Exclusion Added or Modified via Command Line

Adversaries use Add-MpPreference or Set-MpPreference commands to add exclusions in Windows Defender, allowing malicious code to execute undetected, and this activity can be detected via Endpoint Detection and Response (EDR) agents.

Windows Defender +3 windowsdefender exclusion defense-evasion endpoint
2r
high advisory

Windows Defender Exclusion Registry Modification

Adversaries modify Windows Defender exclusion registry entries to bypass antivirus and execute malicious code undetected, potentially leading to persistence and further malicious activities.

Windows Defender +3 windows endpoint registry defender exclusion defense-evasion malware
2r 1t
medium advisory

Windows Defender Exclusions Added via PowerShell

Adversaries may attempt to bypass Windows Defender's capabilities by using PowerShell to add exclusions for folders or processes, and this activity can be detected by monitoring PowerShell command lines that use `Add-MpPreference` or `Set-MpPreference` with exclusion parameters.

Microsoft Defender XDR +3 defense-evasion powershell windows
2r 3t
high advisory

Windows Defender File Hash Computation Disabled via Registry Modification

Attackers may disable Windows Defender's ability to compute file hashes by modifying the EnableFileHashComputation registry value, impairing its malware detection capabilities.

Windows Defender +3 defense-evasion registry-modification windows-defender
2r 1t
high advisory

Windows Defender Infection Reporting Disabled via Registry Modification

Attackers modify the Windows registry to disable Windows Defender's infection reporting, preventing detailed threat information from reaching Microsoft and potentially allowing malware to evade detection.

Windows Defender +3 defense-evasion registry-modification windows
2r
high advisory

Windows Defender Logging Disabled via Registry Modification

Attackers may disable Windows Defender logging by modifying specific registry keys to evade detection and conceal malicious activities.

Windows Defender +3 defense-evasion registry-modification windows
2r 1t
high threat

Windows Defender MpEngine Disabled via Registry Modification

An attacker modifies the Windows Defender MpEngine registry value to disable key features, potentially allowing malware to evade detection.

Windows Defender IcedID defense-evasion registry-modification windows-defender
2r 1t
high advisory

Windows Defender Network Protection Disabled via Registry Modification

This analytic detects modifications to the Windows registry to disable Windows Defender Network Protection, potentially leaving the system vulnerable to network-based threats.

Windows Defender defense-evasion privilege-escalation windows-registry
2r 1t
high advisory

Windows Defender Phishing Filter Override via Registry Modification

The analytic detects modifications to the Windows registry that disable the Windows Defender phishing filter, potentially allowing attackers to deceive users into visiting malicious websites without browser warnings.

Microsoft Edge +3 defense-evasion windows registry-abuse
2r 1t
high advisory

Windows Defender Profile Registry Key Deletion

Detection of Windows Defender profile registry key deletion, indicating potential defense evasion by malware or threat actors aiming to disable security controls.

Windows Defender +3 defense-evasion registry-abuse windows
2r 1t
high advisory

Windows Defender Protocol Recognition Disabled via Registry Modification

An attacker modifies the Windows Registry to disable Windows Defender protocol recognition, hindering its ability to detect and respond to malware, potentially leading to successful data exfiltration or system compromise.

Windows Defender +3 defense-evasion windows registry-modification
2r 1t
high advisory

Windows Defender Real-time Signature Delivery Disabled via Registry Modification

The following analytic detects modifications to the Windows registry that disable the Windows Defender real-time signature delivery feature, preventing timely malware definition updates and potentially leading to system compromise.

Splunk Enterprise +3 defense-evasion windows-defender registry-modification endpoint
2r 1t
medium advisory

Windows Defender Reporting Disabled via Registry Modification

Attackers modify the Windows registry to disable Windows Defender generic reports, preventing error reports and potentially hiding malicious activity.

Windows Defender defense-evasion windows registry
2r 1t
medium advisory

Windows Defender Scan On Update Disabled via Registry Modification

An attacker modifies the Windows registry to disable the Windows Defender Scan On Update feature, potentially evading detection and establishing persistence.

Windows Defender +3 defense-evasion registry-modification windows-defender
2r 1t
medium advisory

Windows Defender Signature Retirement Disabled via Registry Modification

An attacker disables Windows Defender's signature retirement feature by modifying a registry key, potentially reducing its effectiveness in detecting threats by allowing older, less relevant signatures to persist.

Windows Defender +3 defense-evasion windows-registry windows-defender
2r 1t
high advisory

Windows Defender SmartScreen App Install Control Disabled via Registry Modification

Attackers modify the Windows Registry to disable Windows Defender SmartScreen App Install Control, potentially allowing the installation of malicious web-based applications without restrictions, leading to system compromise and sensitive information exposure.

Splunk Enterprise +3 defense-evasion registry-abuse windows
2r
high advisory

Windows Defender SmartScreen Prompt Override via Registry Modification

Attackers modify the Windows registry to disable SmartScreen prompt overrides, potentially allowing users to bypass security warnings and execute harmful content, leading to system compromise.

Edge +3 defense-evasion registry-modification smartscreen
2r
high advisory

Windows Defender Threat Action Modification via Registry

An attacker modifies the Windows Defender ThreatSeverityDefaultAction registry setting to weaken defenses, potentially leading to unaddressed threats and system compromise.

Windows Defender +3 windows endpoint registry defense-evasion
2r
medium advisory

Windows Defender Throttle Rate Modification

An attacker modifies the Windows Defender ThrottleDetectionEventsRate registry setting to reduce the frequency of logged detection events, potentially evading detection.

Splunk Enterprise +2 windows defender registry defense-evasion
2r 1t
medium advisory

Windows Defender Tracing Level Modification

The following analytic detects modifications to the Windows registry specifically targeting the 'WppTracingLevel' setting within Windows Defender, potentially impairing its diagnostic capabilities and allowing attackers to evade detection.

Windows Defender +3 defense-evasion registry-modification windows
2r
high advisory

Windows Defender Web Content Evaluation Disabled via Registry Modification

An attacker modifies the Windows registry to disable Windows Defender web content evaluation, potentially allowing malicious web content to bypass security checks and compromise the system.

Windows Defender +3 defense-evasion registry-modification windows
2r
high advisory

Windows Event Logging Service Shutdown Detection

Detection of the Windows Event Log service shutdown, indicated by Event ID 1100, which can signify attempts to evade detection by disabling logging.

Splunk Enterprise +3 defense-evasion windows event-logging
2r 1t
high advisory

Windows EventLog ChannelAccess Registry Modification

An attacker modifies the Windows EventLog ChannelAccess registry value to evade defenses by blocking security products from accessing event logs.

Sysmon defense-evasion registry-modification eventlog windows
2r 1t
high advisory

Windows EventLog Security Descriptor Tampering

This analytic detects suspicious modifications to the EventLog security descriptor registry value, specifically the 'CustomSD' value, within the registry path 'HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Eventlog\<Channel>\CustomSD', which can be used for defense evasion by attackers.

Sysmon +3 defense-evasion eventlog registry tampering
2r 1t
high advisory

Windows Files and Dirs Access Rights Modification via Icacls

Detection of icacls.exe, cacls.exe, or xcacls.exe being used to modify file or directory permissions, often used by APTs and coinminers for defense evasion and persistence.

Splunk Enterprise +2 defense-evasion persistence windows access-control
2r 1t
high advisory

Windows Filtering Platform Policy Added to Block EDR Process

Attackers modify the Windows Filtering Platform (WFP) policy to block the communication of endpoint detection and response (EDR) processes, impairing their functionality and hindering detection of malicious activities.

CylanceSvc.exe +15 edr-bypass defense-evasion wfp
2r 1t
medium advisory

Windows Firewall Disabled via PowerShell

Attackers may disable the Windows firewall or its rules using the `Set-NetFirewallProfile` PowerShell cmdlet to enable lateral movement and command and control activity.

Microsoft Defender XDR +3 defense-evasion powershell firewall windows
2r 2t