Skip to content
Threat Feed

Tag

Windows-Defender

13 briefs RSS
high advisory

Windows Defender Controlled Folder Access Disabled via Registry Modification

An attacker modifies the Windows registry to disable Windows Defender Controlled Folder Access, a defense evasion technique that weakens protections against unauthorized access and ransomware.

Splunk Enterprise +3 defense-evasion registry-modification windows-defender
2r 1t
high advisory

Suspicious PowerShell Command Removing Windows Defender Directory

A PowerShell command attempting to remove the Windows Defender directory is detected via PowerShell Script Block Logging, potentially indicating an attacker's attempt to disable endpoint protection for further malicious activities.

Windows Defender +3 powershell defense-evasion windows-defender endpoint
2r 1t
medium advisory

Windows Defender Signature Retirement Disabled via Registry Modification

An attacker disables Windows Defender's signature retirement feature by modifying a registry key, potentially reducing its effectiveness in detecting threats by allowing older, less relevant signatures to persist.

Windows Defender +3 defense-evasion windows-registry windows-defender
2r 1t
medium advisory

Windows Defender Scan On Update Disabled via Registry Modification

An attacker modifies the Windows registry to disable the Windows Defender Scan On Update feature, potentially evading detection and establishing persistence.

Windows Defender +3 defense-evasion registry-modification windows-defender
2r 1t
high advisory

Windows Defender Real-time Signature Delivery Disabled via Registry Modification

The following analytic detects modifications to the Windows registry that disable the Windows Defender real-time signature delivery feature, preventing timely malware definition updates and potentially leading to system compromise.

Splunk Enterprise +3 defense-evasion windows-defender registry-modification endpoint
2r 1t
high threat

Windows Defender MpEngine Disabled via Registry Modification

An attacker modifies the Windows Defender MpEngine registry value to disable key features, potentially allowing malware to evade detection.

Windows Defender IcedID defense-evasion registry-modification windows-defender
2r 1t
high advisory

Windows Defender File Hash Computation Disabled via Registry Modification

Attackers may disable Windows Defender's ability to compute file hashes by modifying the EnableFileHashComputation registry value, impairing its malware detection capabilities.

Windows Defender +3 defense-evasion registry-modification windows-defender
2r 1t
high advisory

Windows Defender Enhanced Notification Disabled via Registry Modification

An attacker modifies the Windows Registry to disable Windows Defender's Enhanced Notification feature, preventing users from receiving security alerts and potentially allowing malicious activities to go unnoticed, ultimately enabling persistence and evasion.

Windows Defender +3 registry-modification windows-defender persistence evasion
2r 1t
high advisory

Windows Defender ASR or Threat Configuration Tampering

Adversaries tamper with Windows Defender's Attack Surface Reduction (ASR) rules or threat default actions using Add-MpPreference or Set-MpPreference commands, aiming to bypass the security tool for undetected malicious code execution.

Windows Defender +3 defense-evasion windows-defender endpoint
2r 1t
high advisory

PowerShell Used to Disable Windows Defender Security Monitoring

Attackers are using PowerShell commands with specific Set-MpPreference parameters to disable Windows Defender's real-time behavior monitoring, a common tactic for malware to evade detection and persist on compromised systems.

Windows Defender powershell windows-defender defense-evasion endpoint
3r 1t
high advisory

Detecting Disabling of Windows Defender Sample Submission

An attacker modifies the Windows registry to disable the Windows Defender Submit Samples Consent feature, preventing the submission of suspicious files for analysis, and potentially evading detection.

Splunk Enterprise +3 defense-evasion registry-modification windows-defender
2r
medium advisory

Windows Defender Quick Scan Interval Modification

Detection of modifications to the Windows registry that change the Windows Defender Quick Scan Interval, potentially impairing its ability to detect malware promptly.

Splunk Enterprise +3 defense-evasion windows-registry windows-defender endpoint
2r 1t
high advisory

PowerShell Windows Defender Exclusion Commands

Detection of PowerShell commands, specifically `Add-MpPreference` or `Set-MpPreference`, used to create Windows Defender exclusions, enabling attackers to bypass antivirus defenses and execute malicious code undetected.

Windows Defender +3 defense-evasion powershell windows-defender
2r 1t