<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Windows Defender — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/windows-defender/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 23 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/windows-defender/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Defender Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-defender-registry-disable/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-defender-registry-disable/</guid><description>Attackers modify the Windows Defender registry settings to disable the service or set the service to be started manually, evading defenses.</description><content:encoded><![CDATA[<p>Attackers commonly disable Windows Defender to evade detection and facilitate malicious activities. This involves modifying specific registry settings to either disable the service entirely or prevent it from starting automatically. The rule specifically identifies modifications to the <code>DisableAntiSpyware</code> and <code>WinDefend\\Start</code> registry keys. The DFIR Report has documented this technique in real-world incidents, highlighting its effectiveness in bypassing built-in security measures. This allows threat actors to operate with reduced risk of detection, enabling them to deploy malware, exfiltrate data, or perform other malicious actions without immediate interference from the endpoint security solution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, potentially through phishing or exploiting a software vulnerability.</li>
<li>The attacker elevates privileges to obtain the necessary permissions to modify the registry.</li>
<li>The attacker modifies the <code>HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\DisableAntiSpyware</code> registry key to disable Windows Defender, setting its value to &ldquo;1&rdquo; or &ldquo;0x00000001&rdquo;.</li>
<li>Alternatively, the attacker modifies the <code>HKLM\\System\\*ControlSet*\\Services\\WinDefend\\Start</code> registry key to prevent the Windows Defender service from starting automatically. The attacker sets the value to &ldquo;3&rdquo; or &ldquo;4&rdquo; (or their hexadecimal equivalents &ldquo;0x00000003&rdquo;, &ldquo;0x00000004&rdquo;).</li>
<li>The attacker verifies that Windows Defender is disabled by checking the Security Center or attempting to run a scan.</li>
<li>With Windows Defender disabled, the attacker proceeds to deploy malware or execute malicious commands without interference from the antivirus software.</li>
<li>The attacker may further disable security settings and block security-related indicators.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>If successful, this attack can lead to a complete compromise of the affected system. With Windows Defender disabled, the system becomes vulnerable to malware infections, data exfiltration, and other malicious activities. This can result in financial losses, data breaches, and reputational damage for the targeted organization. The lack of immediate detection allows attackers to establish persistence and expand their foothold within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Registry Modification to Disable Windows Defender&rdquo; to your SIEM and tune for your environment to detect unauthorized changes to Windows Defender registry settings.</li>
<li>Monitor registry events for changes to the <code>HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\DisableAntiSpyware</code> and <code>HKLM\\System\\*ControlSet*\\Services\\WinDefend\\Start</code> registry keys using the provided log sources.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process and user account responsible for the registry modifications.</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the Sigma rule to function effectively.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>registry modification</category></item><item><title>Disabling Windows Defender Security Settings via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-disable-defender-powershell/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-disable-defender-powershell/</guid><description>Attackers use PowerShell commands, including base64-encoded variants, to disable or weaken Windows Defender settings, impairing defenses on compromised systems.</description><content:encoded><![CDATA[<p>Attackers commonly attempt to disable or weaken Windows Defender to evade detection and facilitate malicious activities. This involves using PowerShell commands like <code>Set-MpPreference</code> or <code>Add-MpPreference</code> to modify Defender&rsquo;s configuration. Adversaries may also utilize base64 encoding to obfuscate these commands, bypassing simple command-line inspection. This activity typically occurs post-compromise, as part of a broader attack chain, and allows for the deployment of malware or other malicious tools without interference from the built-in antivirus. Detection of these techniques is crucial for maintaining the integrity of the system and preventing further damage. The scope of this threat includes any Windows environment where PowerShell is enabled and Windows Defender is used as the primary antivirus solution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is achieved through an existing compromise (e.g., phishing, exploit).</li>
<li>The attacker gains a foothold on the system and escalates privileges if necessary.</li>
<li>PowerShell is launched, either directly or through a parent process like <code>cmd.exe</code>.</li>
<li>The attacker uses <code>Set-MpPreference</code> or <code>Add-MpPreference</code> with parameters like <code>-DisableRealtimeMonitoring</code>, <code>-DisableIOAVProtection</code>, <code>-DisableBehaviorMonitoring</code>, or <code>-DisableBlockAtFirstSeen</code> to weaken Defender.</li>
<li>Alternatively, the attacker crafts a base64-encoded PowerShell command that performs the same actions.</li>
<li>The encoded command is executed using the <code>-EncodedCommand</code> or <code>-enc</code> parameter.</li>
<li>Windows Defender&rsquo;s security settings are modified, reducing its effectiveness.</li>
<li>The attacker proceeds with deploying malware, exfiltrating data, or other malicious objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of these commands results in a weakened or disabled Windows Defender, leaving the system vulnerable to malware infections and other threats. This can lead to data breaches, system compromise, and financial loss. The impact is especially significant in environments where Windows Defender is the primary security solution. While the number of victims is unknown, the technique is widely applicable across Windows environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for PowerShell executions (<code>powershell.exe</code>, <code>pwsh.exe</code>) with command-line arguments related to disabling Windows Defender using the Sigma rule &ldquo;Detect Suspicious PowerShell Encoded Commands&rdquo;.</li>
<li>Enable PowerShell script block logging to capture the full content of executed scripts, which can reveal base64-encoded commands (reference: references - <a href="https://docs.microsoft.com/en-us/powershell/module/defender/set-mppreference?view=windowsserver2019-ps)">https://docs.microsoft.com/en-us/powershell/module/defender/set-mppreference?view=windowsserver2019-ps)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Disabling Windows Defender Security Settings via PowerShell&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any instances of <code>Set-MpPreference</code> or <code>Add-MpPreference</code> commands with arguments disabling real-time monitoring, IOAV protection, behavior monitoring, or block-at-first-seen features.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>windows</category></item><item><title>Potential RemoteMonologue Attack via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-remotemonologue-regmod/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remotemonologue-regmod/</guid><description>This rule detects potential RemoteMonologue attacks by identifying attempts to perform session hijacking via COM object registry modification, specifically when the RunAs value is set to Interactive User.</description><content:encoded><![CDATA[<p>The RemoteMonologue attack technique abuses Component Object Model (COM) objects to coerce authentication from a remote system. This is achieved by modifying the <code>RunAs</code> registry value associated with a COM object. Setting this value to &ldquo;Interactive User&rdquo; forces the COM object to run under the context of the interactive user, enabling attackers to hijack sessions and potentially escalate privileges. This technique is often used as a defense evasion or persistence mechanism by adversaries after gaining initial access to a system. The attack involves modifying registry keys associated with COM objects to trigger NTLM authentication coercion. This can be used for lateral movement and gaining access to sensitive resources. This rule is designed to detect registry modifications indicative of the RemoteMonologue attack.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to the target system through unspecified means.</li>
<li>Identify COM Objects: The attacker identifies suitable COM objects for abuse.</li>
<li>Modify Registry: The attacker modifies the registry to set the <code>RunAs</code> value for the selected COM object to <code>Interactive User</code>. This involves modifying the registry path <code>HKCR\AppID\{Clsid}\RunAs</code>.</li>
<li>Trigger COM Object Execution: The attacker triggers the execution of the modified COM object, potentially through a remote procedure call or other inter-process communication mechanisms.</li>
<li>Authentication Coercion: The execution of the COM object triggers NTLM authentication to a system controlled by the attacker.</li>
<li>Relay Attack: The attacker relays the coerced NTLM authentication to gain access to other resources on the network.</li>
<li>Session Hijacking: Successful relay leads to session hijacking, allowing the attacker to impersonate the user.</li>
<li>Lateral Movement/Privilege Escalation: The attacker uses the hijacked session for lateral movement or privilege escalation within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful RemoteMonologue attack can lead to unauthorized access to sensitive systems and data. By coercing authentication and hijacking sessions, attackers can bypass security controls and escalate their privileges within the network. The scope of the impact depends on the privileges of the hijacked user account and the resources accessible to that account. This attack can enable lateral movement, data exfiltration, and other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect RemoteMonologue Registry Modification</code> to your SIEM to identify suspicious registry modifications related to COM object hijacking.</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the Sigma rules to function effectively.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the registry event logs and identifying the user account and process responsible for the registry modification.</li>
<li>Implement enhanced monitoring on critical systems to detect any attempts to modify COM object registry settings.</li>
<li>Block the attack by ensuring &ldquo;RunAs&rdquo; value is not set to &ldquo;Interactive User&rdquo;.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>remotemonologue</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Suspicious Microsoft Antimalware Service Executable Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-windefend-unusual-path/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-windefend-unusual-path/</guid><description>Detects suspicious execution of the Microsoft Antimalware Service Executable (MsMpEng.exe) from non-standard paths or renamed instances, which may indicate an attempt to evade defenses through DLL side-loading or masquerading.</description><content:encoded><![CDATA[<p>This detection identifies suspicious execution of the Microsoft Antimalware Service Executable (MsMpEng.exe) from non-standard paths or renamed instances. Attackers may attempt to evade defenses through DLL side-loading or by masquerading as the antimalware process. This technique is used to blend in with legitimate system activity and avoid detection by security tools. This rule is designed to detect instances where MsMpEng.exe is executed from unexpected locations or has been renamed, potentially indicating malicious activity. The rule leverages process monitoring data to identify deviations from the expected execution patterns of the antimalware service. This behavior has been seen associated with ransomware attacks, such as REvil.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker drops a malicious payload onto the system, placing it in a non-standard directory, such as a temporary folder or a user&rsquo;s profile directory.</li>
<li>The attacker renames or copies the legitimate MsMpEng.exe to the malicious payload&rsquo;s location.</li>
<li>The attacker executes the renamed or copied MsMpEng.exe from the non-standard location. This is intended to mimic legitimate activity and evade detection.</li>
<li>The malicious MsMpEng.exe then loads a malicious DLL through DLL side-loading, which executes arbitrary code within the context of the antimalware process.</li>
<li>The malicious code performs actions such as disabling security controls, escalating privileges, or establishing persistence.</li>
<li>The attacker leverages the compromised system to move laterally within the network, compromising additional systems.</li>
<li>The attacker achieves their final objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to complete system compromise, including the disabling of security controls, data theft, and ransomware deployment. This can result in significant financial losses, reputational damage, and disruption of business operations. Identifying and responding to this type of attack is critical to prevent further damage. The Sophos article references the REvil ransomware attack which impacted hundreds of businesses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (Event ID 1) to capture process execution events, including image path and command-line arguments, which are essential for detecting this behavior.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious MsMpEng.exe execution from unusual paths or renamed instances.</li>
<li>Investigate any alerts generated by these rules to determine the legitimacy of the MsMpEng.exe execution and identify any potential malicious activity.</li>
<li>Monitor process execution events for instances where the process name is &ldquo;MsMpEng.exe&rdquo; but the executable path is outside the standard Windows Defender or Microsoft Security Client directories.</li>
<li>Review the references provided for additional context and guidance on investigating this type of activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>windows</category></item><item><title>Suspicious LSASS Process Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-lsass-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-lsass-access/</guid><description>This rule identifies suspicious access attempts to the LSASS process, potentially indicating credential dumping attempts by filtering out legitimate processes and access patterns to focus on anomalies.</description><content:encoded><![CDATA[<p>The Local Security Authority Subsystem Service (LSASS) is a critical Windows component responsible for enforcing security policies and handling user authentication. Attackers often target LSASS to extract credentials, enabling unauthorized access and privilege escalation. This detection rule identifies suspicious access attempts to LSASS memory, which may indicate credential dumping activities. It filters out common legitimate processes and access patterns to highlight anomalous behaviors associated with credential theft. The rule is designed to detect unauthorized access attempts by monitoring process access events and filtering out known benign processes that interact with LSASS. It helps defenders identify potential credential access attempts before they lead to significant compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through phishing or exploitation of a vulnerability.</li>
<li>The attacker executes a malicious process or script on the compromised system.</li>
<li>The malicious process attempts to gain a handle to the LSASS process.</li>
<li>The attacker&rsquo;s tool requests specific access rights to LSASS, such as <code>ReadProcessMemory</code> (0x0010) or <code>PROCESS_QUERY_INFORMATION</code> (0x0400), which are necessary for memory dumping.</li>
<li>The attacker&rsquo;s process bypasses or disables endpoint detection and response (EDR) solutions to avoid detection.</li>
<li>The tool dumps the LSASS memory, extracting sensitive information like usernames, passwords, and Kerberos tickets.</li>
<li>The attacker uses the extracted credentials to move laterally within the network, accessing other systems and resources.</li>
<li>The attacker achieves their objective, such as data exfiltration or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful LSASS memory dump can lead to the compromise of domain credentials, allowing attackers to move laterally within the network and gain access to sensitive data and systems. This can result in data breaches, financial loss, and reputational damage. Organizations across all sectors are vulnerable, particularly those with weak credential management practices. A single compromised account can lead to widespread damage, potentially affecting thousands of systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process access event logging (Event ID 10) as described in the setup instructions linked in the rule to collect the necessary data.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Lsass Process Access&rdquo; to your SIEM and tune the exclusions based on your environment to reduce false positives.</li>
<li>Review and harden privileged account management practices to limit the impact of credential compromise.</li>
<li>Monitor systems for unusual process creation events, especially those spawning from unexpected locations, to identify potential initial access points.</li>
<li>Regularly scan systems for vulnerabilities and apply patches to prevent exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>windows</category></item><item><title>MpCmdRun.exe Used for Remote File Download</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-mpcmdrun-remote-file-copy/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-mpcmdrun-remote-file-copy/</guid><description>Attackers are abusing the Windows Defender MpCmdRun.exe utility to download remote files, potentially delivering malware or offensive tools into compromised systems.</description><content:encoded><![CDATA[<p>Attackers are leveraging the built-in Windows Defender command-line utility, <code>MpCmdRun.exe</code>, to download files from remote locations. This technique allows attackers to bypass traditional download restrictions and blend in with legitimate system activity. The <code>MpCmdRun.exe</code> utility is normally used to manage Windows Defender settings and perform tasks such as signature updates and scans. However, its <code>-DownloadFile</code> parameter can be abused to download arbitrary files from a specified URL. This activity was first publicly reported around September 2020. Defenders should monitor for unusual usage patterns of <code>MpCmdRun.exe</code>, especially those involving command-line arguments related to file downloads from external sources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a target system through an unrelated vulnerability or existing compromise.</li>
<li>The attacker uses <code>MpCmdRun.exe</code> to download a file from a remote server. The command includes arguments like <code>-DownloadFile</code>, <code>-url</code>, and <code>-path</code> to specify the download location and save path.</li>
<li>The downloaded file is saved to a location on the compromised system.</li>
<li>The attacker executes the downloaded file. This could be a malicious executable, a script, or a configuration file.</li>
<li>The executed file performs further malicious actions on the system, such as establishing persistence, escalating privileges, or deploying additional payloads.</li>
<li>The attacker uses the compromised system as a foothold to move laterally within the network, compromising other systems and resources.</li>
<li>The attacker achieves their ultimate objective, such as data exfiltration, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to introduce arbitrary malicious code into the system, potentially leading to a wide range of adverse effects, including data theft, system compromise, and disruption of operations. While individual cases may be limited in scope, widespread exploitation could impact numerous organizations, resulting in significant financial losses and reputational damage. The use of a trusted system utility makes this technique harder to detect using traditional methods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>MpCmdRun Remote File Download</code> to your SIEM to detect the malicious use of <code>MpCmdRun.exe</code> for downloading files.</li>
<li>Enable Sysmon process creation logging with command-line arguments to provide the necessary data for the Sigma rule to function.</li>
<li>Review historical process execution logs for instances of <code>MpCmdRun.exe</code> being used with the <code>-DownloadFile</code> parameter.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted executables downloaded by <code>MpCmdRun.exe</code>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>ingress-tool-transfer</category><category>windows</category><category>mpcmdrun</category></item><item><title>Disabling Windows Defender Security Settings via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-disable-defender-powershell/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-disable-defender-powershell/</guid><description>Attackers use PowerShell commands like Set-MpPreference or Add-MpPreference, often with base64 encoding, to disable or weaken Windows Defender security settings in order to evade detection and execute malicious payloads.</description><content:encoded><![CDATA[<p>Attackers frequently attempt to disable or weaken Windows Defender to facilitate the execution of malware and other malicious activities. This is often achieved through the use of PowerShell commands like <code>Set-MpPreference</code> and <code>Add-MpPreference</code>, which can modify various Defender settings. To evade detection, adversaries may encode these commands using Base64, making it more difficult for traditional command-line inspection techniques to identify the malicious intent. This activity is a common tactic in post-exploitation scenarios, allowing attackers to operate with reduced risk of being detected by the built-in antivirus solution. Detection of this behavior is critical for identifying and responding to potential intrusions. The Elastic detection rule aims to catch both standard and encoded PowerShell commands used for this purpose.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through methods such as phishing or exploiting a vulnerability.</li>
<li>The attacker elevates privileges to gain necessary permissions to modify Windows Defender settings.</li>
<li>The attacker uses the <code>powershell.exe</code> process to execute commands.</li>
<li>The attacker uses <code>Set-MpPreference</code> or <code>Add-MpPreference</code> to disable real-time monitoring.</li>
<li>The attacker may use Base64 encoding (e.g., using the <code>-EncodedCommand</code> parameter) to obfuscate the PowerShell commands.</li>
<li>The encoded command is executed, modifying Windows Defender settings.</li>
<li>Windows Defender&rsquo;s real-time monitoring is disabled, allowing the attacker to execute malicious payloads without immediate detection.</li>
<li>The attacker proceeds with their objectives, such as deploying ransomware or exfiltrating data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of Windows Defender can lead to a significant increase in the risk of malware infection and data breach. With real-time protection disabled, the system becomes vulnerable to various threats, including ransomware, Trojans, and other malicious software. This can result in data loss, system compromise, and potential financial damages. The impact can be severe, especially if the compromised system handles sensitive information or is critical to business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Disabling Windows Defender Security Settings via PowerShell&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable PowerShell Script Block Logging to gain better visibility into the commands being executed (referenced in Sysmon setup instructions).</li>
<li>Monitor process creation events for PowerShell processes executing commands with <code>-EncodedCommand</code> or containing specific Base64 encoded strings to detect obfuscated attempts to disable Windows Defender.</li>
<li>Investigate any instances of <code>Set-MpPreference</code> or <code>Add-MpPreference</code> being used, especially if accompanied by unusual parent processes or command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>windows</category></item></channel></rss>