<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Windows Malware Protection Engine — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/windows-malware-protection-engine/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/windows-malware-protection-engine/feed.xml" rel="self" type="application/rss+xml"/><item><title>MpCmdRun Execution with RemoveDefinitions Argument</title><link>https://feed.craftedsignal.io/briefs/2024-01-mpcmdrun-removedefinitions/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mpcmdrun-removedefinitions/</guid><description>The execution of MpCmdRun.exe with the '-RemoveDefinitions' argument, used to remove definitions from the Windows Malware Protection Engine, can indicate potential malware activity or attempts to bypass security measures.</description><content:encoded><![CDATA[<p>The threat involves the use of MpCmdRun.exe, the command-line interface for Windows Defender, with the <code>-RemoveDefinitions</code> argument. This command is designed to remove existing malware definitions from the Windows Malware Protection Engine. While legitimate use cases exist, its execution can also be indicative of malicious activity aimed at disabling or weakening endpoint security controls. An attacker or malware may use this command to bypass detection after gaining initial access. This technique is particularly concerning because it can leave systems vulnerable to known threats by deleting the corresponding definitions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the system, possibly through phishing, exploitation of a vulnerability, or compromised credentials.</li>
<li>Privilege Escalation: The attacker escalates privileges to execute commands with administrative rights, necessary to manipulate Windows Defender.</li>
<li>Defense Evasion: The attacker executes <code>MpCmdRun.exe</code> with the <code>-RemoveDefinitions</code> argument.</li>
<li>Definition Removal: Windows Defender removes the existing malware definitions, weakening the system&rsquo;s ability to detect and prevent known threats.</li>
<li>Malware Deployment: The attacker deploys malware or performs malicious activities, now with a reduced chance of being detected by Windows Defender.</li>
<li>Lateral Movement: The attacker uses the compromised system to move laterally within the network, infecting other machines.</li>
<li>Data Exfiltration/Ransomware Deployment: The attacker exfiltrates sensitive data or deploys ransomware, leveraging the weakened security posture of the compromised systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this attack can severely compromise endpoint security. By removing malware definitions, the attacker effectively blinds Windows Defender to known threats. This can lead to successful malware infections, data breaches, ransomware deployment, and overall system instability. If widely deployed across an organization, the impact could affect hundreds or thousands of endpoints, causing significant financial and operational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>MpCmdRun RemoveDefinitions Execution</code> to your SIEM and tune for your environment to detect the execution of <code>MpCmdRun.exe</code> with the <code>-RemoveDefinitions</code> argument.</li>
<li>Investigate any instances of <code>MpCmdRun.exe</code> executing with the <code>-RemoveDefinitions</code> argument to determine if the behavior is legitimate or malicious, based on the <code>references</code> link to Ukraine CERT advisory.</li>
<li>Implement strict access controls to limit the ability to execute <code>MpCmdRun.exe</code> and other security-related tools.</li>
<li>Monitor process execution logs (Sysmon EventID 1, Windows Event Log Security 4688, CrowdStrike ProcessRollup2) for unusual activity related to Windows Defender and other security software.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>endpoint</category><category>mpcmdrun</category><category>malware</category></item></channel></rss>