Tag
Windows Defender Controlled Folder Access Disabled via Registry Modification
2 rules 1 TTPAn attacker modifies the Windows registry to disable Windows Defender Controlled Folder Access, a defense evasion technique that weakens protections against unauthorized access and ransomware.
Suspicious PowerShell Command Removing Windows Defender Directory
2 rules 1 TTPA PowerShell command attempting to remove the Windows Defender directory is detected via PowerShell Script Block Logging, potentially indicating an attacker's attempt to disable endpoint protection for further malicious activities.
Windows Defender Signature Retirement Disabled via Registry Modification
2 rules 1 TTPAn attacker disables Windows Defender's signature retirement feature by modifying a registry key, potentially reducing its effectiveness in detecting threats by allowing older, less relevant signatures to persist.
Windows Defender Scan On Update Disabled via Registry Modification
2 rules 1 TTPAn attacker modifies the Windows registry to disable the Windows Defender Scan On Update feature, potentially evading detection and establishing persistence.
Windows Defender Real-time Signature Delivery Disabled via Registry Modification
2 rules 1 TTPThe following analytic detects modifications to the Windows registry that disable the Windows Defender real-time signature delivery feature, preventing timely malware definition updates and potentially leading to system compromise.
Windows Defender MpEngine Disabled via Registry Modification
2 rules 1 TTPAn attacker modifies the Windows Defender MpEngine registry value to disable key features, potentially allowing malware to evade detection.
Windows Defender File Hash Computation Disabled via Registry Modification
2 rules 1 TTPAttackers may disable Windows Defender's ability to compute file hashes by modifying the EnableFileHashComputation registry value, impairing its malware detection capabilities.
Windows Defender Enhanced Notification Disabled via Registry Modification
2 rules 1 TTPAn attacker modifies the Windows Registry to disable Windows Defender's Enhanced Notification feature, preventing users from receiving security alerts and potentially allowing malicious activities to go unnoticed, ultimately enabling persistence and evasion.
Windows Defender ASR or Threat Configuration Tampering
2 rules 1 TTPAdversaries tamper with Windows Defender's Attack Surface Reduction (ASR) rules or threat default actions using Add-MpPreference or Set-MpPreference commands, aiming to bypass the security tool for undetected malicious code execution.
PowerShell Used to Disable Windows Defender Security Monitoring
3 rules 1 TTPAttackers are using PowerShell commands with specific Set-MpPreference parameters to disable Windows Defender's real-time behavior monitoring, a common tactic for malware to evade detection and persist on compromised systems.
Detecting Disabling of Windows Defender Sample Submission
2 rulesAn attacker modifies the Windows registry to disable the Windows Defender Submit Samples Consent feature, preventing the submission of suspicious files for analysis, and potentially evading detection.
Windows Defender Quick Scan Interval Modification
2 rules 1 TTPDetection of modifications to the Windows registry that change the Windows Defender Quick Scan Interval, potentially impairing its ability to detect malware promptly.
PowerShell Windows Defender Exclusion Commands
2 rules 1 TTPDetection of PowerShell commands, specifically `Add-MpPreference` or `Set-MpPreference`, used to create Windows Defender exclusions, enabling attackers to bypass antivirus defenses and execute malicious code undetected.