<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>UEMS_Agent — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/uems_agent/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/uems_agent/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Defense Evasion via Filter Manager (fltMC.exe)</title><link>https://feed.craftedsignal.io/briefs/2024-01-filter-manager-evasion/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-filter-manager-evasion/</guid><description>Adversaries may abuse the Filter Manager Control Program (fltMC.exe) to unload filter drivers, thereby evading security software defenses such as malware detection and file system monitoring.</description><content:encoded><![CDATA[<p>The Filter Manager Control Program (fltMC.exe) is a Windows utility used to manage filter drivers, also known as minifilters. These minifilters are leveraged by various security products, including EDR, antivirus solutions, and data loss prevention tools, to intercept and modify I/O requests. Attackers can abuse fltMC.exe to unload these minifilters, effectively disabling or circumventing the security measures they provide. This allows malicious actors to operate without detection, potentially leading to data breaches, malware infections, or other harmful activities. This technique has been observed being used to disable security products such as Bitdefender, SentinelOne and ManageEngine Endpoint Central.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system (e.g., via compromised credentials or exploit).</li>
<li>Attacker executes <code>fltMC.exe</code> with administrative privileges.</li>
<li><code>fltMC.exe</code> attempts to unload a specific filter driver (minifilter).</li>
<li>The operating system processes the request to unload the specified filter driver.</li>
<li>If successful, the targeted minifilter is removed from the active filter stack.</li>
<li>Security software relying on the unloaded minifilter ceases to function correctly, leaving a security gap.</li>
<li>Attacker performs malicious actions, such as deploying malware or exfiltrating sensitive data, without the protection of the disabled filter driver.</li>
<li>Attacker achieves their objective, such as data theft or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to disable or circumvent security controls, increasing the likelihood of successful malware infections, data breaches, and other malicious activities. The scope of impact depends on the specific filter driver unloaded and the security products it supports. Disabling a critical EDR minifilter could leave the entire system vulnerable, while disabling a less critical filter might only impact a subset of security features.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of <code>fltMC.exe</code> with the <code>unload</code> argument to identify potential evasion attempts (see Sigma rule &ldquo;Potential Evasion via Filter Manager&rdquo;).</li>
<li>Investigate any instances of <code>fltMC.exe</code> execution where the parent process is not a known and trusted system management tool.</li>
<li>Implement strict access controls to limit the ability of users to execute <code>fltMC.exe</code> or modify filter driver configurations.</li>
<li>Review the list of exclusions in the provided EQL query to identify any legitimate software that may be generating false positives.</li>
<li>Ensure that endpoint security solutions are properly configured and monitored to detect and prevent unauthorized filter driver modifications.</li>
<li>Enable Sysmon process creation logging to activate the rules above.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>filter-driver</category><category>fltMC.exe</category><category>windows</category></item></channel></rss>