<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Exclusion — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/exclusion/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/exclusion/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Defender Exclusion Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-defender-exclusion-registry-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-defender-exclusion-registry-modification/</guid><description>Adversaries modify Windows Defender exclusion registry entries to bypass antivirus and execute malicious code undetected, potentially leading to persistence and further malicious activities.</description><content:encoded><![CDATA[<p>Attackers frequently attempt to disable or bypass Windows Defender to execute malware undetected. This is often achieved by modifying the Windows Defender exclusion registry entries. By adding exclusions, attackers can prevent Windows Defender from scanning specific files, folders, or processes. This technique allows malware to operate freely, potentially leading to system compromise. The reported activity focuses on modifications to the registry path &ldquo;<em>\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\</em>&rdquo;, which is a common target for threat actors. This technique can be observed across various malware families, including Remcos RAT, Qakbot, and XWorm, as well as in NetSupport RMM Tool Abuse scenarios, highlighting its versatility and effectiveness in defense evasion. Detecting and preventing these modifications is crucial for maintaining endpoint security.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through various methods (not specified in source).</li>
<li>The attacker elevates privileges to gain necessary permissions (not specified in source).</li>
<li>The attacker modifies the registry key <code>HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\</code> or similar paths.</li>
<li>Specifically, the attacker adds or modifies registry values within the <code>Exclusions</code> key to exclude specific files, folders, or processes from Windows Defender scanning.</li>
<li>The attacker verifies the successful creation or modification of the exclusion by querying the registry.</li>
<li>Malicious code is then executed in the excluded location or process, bypassing Windows Defender&rsquo;s real-time scanning.</li>
<li>The attacker maintains persistence by ensuring the exclusion remains active across reboots.</li>
<li>The attacker performs further malicious activities, such as data exfiltration or lateral movement, undetected by Windows Defender.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of Windows Defender exclusion registry entries allows attackers to bypass antivirus protection. This can lead to the execution of malicious code without detection, enabling persistence, data exfiltration, and other malicious activities. The impact can range from individual system compromise to broader network infections, depending on the attacker&rsquo;s objectives. Several malware families, including Remcos RAT, Qakbot, and XWorm, use this technique, demonstrating its widespread use. A Microsoft blog post referenced destructive malware targeting Ukrainian organizations, suggesting potential for significant operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 13 (RegistryEvent) to capture registry modifications, which is the data source required for the detections.</li>
<li>Deploy the Sigma rule <code>Detect Windows Defender Exclusion Added</code> to identify suspicious registry modifications related to Windows Defender exclusions.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes modifying the Windows Defender exclusion registry keys.</li>
<li>Review and audit existing Windows Defender exclusions to identify any unauthorized or suspicious entries.</li>
<li>Ensure the Sysmon TA is at least version 2.0 as mentioned in the content to properly ingest the logs from endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>windows</category><category>endpoint</category><category>registry</category><category>defender</category><category>exclusion</category><category>defense-evasion</category><category>malware</category></item><item><title>Windows Defender Exclusion Added or Modified via Command Line</title><link>https://feed.craftedsignal.io/briefs/2024-01-defender-exclusion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-defender-exclusion/</guid><description>Adversaries use Add-MpPreference or Set-MpPreference commands to add exclusions in Windows Defender, allowing malicious code to execute undetected, and this activity can be detected via Endpoint Detection and Response (EDR) agents.</description><content:encoded><![CDATA[<p>Attackers often attempt to evade detection by security tools like Windows Defender. One common technique involves adding exclusions to prevent Defender from scanning or detecting malicious files, processes, or network activity. This is often achieved by using the <code>Add-MpPreference</code> or <code>Set-MpPreference</code> PowerShell cmdlets, which can modify Defender&rsquo;s configuration. These commands are used to specify files, folders, or processes that Defender should ignore during scans. Once an exclusion is successfully added, malicious code can execute without being detected by Windows Defender. This is a significant concern for defenders because it directly undermines the effectiveness of the built-in antivirus solution. The activity detected here stems from endpoint telemetry and can often be associated with malware families such as Remcos RAT, AgentTesla, ValleyRAT, XWorm and others.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access through various means, such as phishing emails or exploiting vulnerabilities in software.</li>
<li>Privilege Escalation: Once inside the system, the attacker escalates privileges to gain administrative access, which is required to modify Windows Defender settings.</li>
<li>Discovery: The attacker performs reconnaissance to understand the system&rsquo;s configuration, including the presence and configuration of Windows Defender.</li>
<li>Defense Evasion: The attacker uses <code>Add-MpPreference</code> or <code>Set-MpPreference</code> in PowerShell to add exclusions to Windows Defender, targeting specific files, folders, or processes used by the malware. This bypasses real-time scanning and detection.</li>
<li>Execution: The attacker executes malicious code, which can now run without being detected by Windows Defender due to the added exclusions.</li>
<li>Persistence: The attacker establishes persistence by creating scheduled tasks or modifying registry keys, ensuring that the malicious code continues to run even after a system reboot. The exclusions remain in place to allow continued operation.</li>
<li>Command and Control: The malware establishes communication with a command and control (C2) server to receive further instructions and exfiltrate data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass Windows Defender, leading to undetected malware execution and potentially enabling further malicious activities, such as data theft, ransomware deployment, or system compromise. The number of affected systems depends on the scope of the initial compromise, but the impact can be widespread if the attacker gains access to critical systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture the command-line arguments used when adding Defender exclusions, which is essential for triggering the rules below.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious <code>Add-MpPreference</code> or <code>Set-MpPreference</code> usage and tune them to your environment.</li>
<li>Investigate any instances of <code>Add-MpPreference</code> or <code>Set-MpPreference</code> commands, especially those initiated by unusual parent processes or users.</li>
<li>Regularly review and audit Windows Defender exclusions to identify and remove any unauthorized or suspicious entries.</li>
<li>Monitor the references for IoCs related to malware families abusing Windows Defender exclusions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>windowsdefender</category><category>exclusion</category><category>defense-evasion</category><category>endpoint</category></item></channel></rss>