<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Windows-Defender — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/windows-defender/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/windows-defender/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Defender Controlled Folder Access Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-cfa/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-cfa/</guid><description>An attacker modifies the Windows registry to disable Windows Defender Controlled Folder Access, a defense evasion technique that weakens protections against unauthorized access and ransomware.</description><content:encoded><![CDATA[<p>This analytic detects a modification in the Windows registry that disables the Windows Defender Controlled Folder Access (CFA) feature. The detection leverages Sysmon Event ID 13 to monitor changes to the <code>EnableControlledFolderAccess</code> registry setting. Disabling CFA is a significant defense evasion technique because it weakens a key security feature designed to protect critical folders from unauthorized access, including ransomware attacks. This allows attackers to potentially bypass this security measure and access or modify sensitive files. This behavior has been linked to malware such as BlankGrabber Stealer and used to bypass endpoint protection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker escalates privileges to gain administrative rights necessary to modify the registry.</li>
<li>The attacker uses a script or executable (e.g., PowerShell, <code>reg.exe</code>) to modify the registry.</li>
<li>The attacker targets the registry key <code>*\Windows Defender\Windows Defender Exploit Guard\Controlled Folder Access\EnableControlledFolderAccess</code>.</li>
<li>The attacker sets the registry value to <code>0x00000000</code> to disable Controlled Folder Access.</li>
<li>The system no longer protects designated folders from unauthorized access by untrusted applications.</li>
<li>The attacker deploys ransomware or exfiltrates sensitive data from previously protected folders.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of Controlled Folder Access significantly weakens the endpoint&rsquo;s defenses, leaving critical folders vulnerable to unauthorized access and modification. This can lead to successful ransomware deployment, data theft, and other malicious activities. Without CFA, common attack vectors are unhindered, increasing the likelihood of data breaches and system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 13 to monitor registry modifications, specifically changes to the <code>EnableControlledFolderAccess</code> key, to detect attempts to disable Controlled Folder Access.</li>
<li>Deploy the provided Sigma rules to your SIEM to detect registry modifications that disable Controlled Folder Access and tune for your environment.</li>
<li>Investigate any detected instances of <code>EnableControlledFolderAccess</code> being set to <code>0x00000000</code> to determine if the activity is malicious.</li>
<li>Review and enforce Group Policy settings to prevent users or processes from disabling Controlled Folder Access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>windows-defender</category></item><item><title>Suspicious PowerShell Command Removing Windows Defender Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-powershell-defender-removal/</link><pubDate>Wed, 03 Jan 2024 14:22:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-powershell-defender-removal/</guid><description>A PowerShell command attempting to remove the Windows Defender directory is detected via PowerShell Script Block Logging, potentially indicating an attacker's attempt to disable endpoint protection for further malicious activities.</description><content:encoded><![CDATA[<p>This threat brief addresses a specific PowerShell command designed to remove the Windows Defender directory, a critical component of endpoint security on Windows systems. Attackers may attempt to delete or corrupt Windows Defender to bypass its protection mechanisms, allowing them to execute malicious activities undetected. The detection focuses on identifying PowerShell commands containing &ldquo;rmdir&rdquo; and targeting the specific path associated with Windows Defender. This activity is typically observed following successful initial access and privilege escalation, as attackers attempt to establish persistence or conduct data exfiltration without interference from security software. The original Splunk analytic was published in May 2026, highlighting the enduring relevance of this technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the system through various methods, such as phishing, exploiting vulnerabilities, or using stolen credentials.</li>
<li><strong>Privilege Escalation:</strong> The attacker elevates their privileges to gain administrative rights, enabling them to perform sensitive actions on the system.</li>
<li><strong>Defense Evasion:</strong> The attacker attempts to disable or impair security controls.</li>
<li><strong>PowerShell Execution:</strong> The attacker leverages PowerShell to execute malicious commands.</li>
<li><strong>Directory Removal:</strong> The attacker executes the <code>rmdir</code> command within a PowerShell script, targeting the Windows Defender directory.</li>
<li><strong>Bypass Security Controls:</strong> By removing the Windows Defender directory, the attacker disables real-time protection and other security features.</li>
<li><strong>Lateral Movement/Data Exfiltration:</strong> With endpoint protection disabled, the attacker can move laterally within the network, steal sensitive data, or deploy ransomware without triggering alerts.</li>
<li><strong>Impact:</strong> The attacker achieves their final objective, such as data theft, system disruption, or financial gain, due to the compromised security posture of the endpoint.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful removal of the Windows Defender directory can have severe consequences. It allows attackers to bypass endpoint protection, leading to undetected malware infections, data breaches, and system compromise. Depending on the attacker&rsquo;s objective, this can result in significant financial losses, reputational damage, and operational disruption. Such techniques have been observed in destructive malware campaigns targeting organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging on all endpoints to provide visibility into executed PowerShell commands. Reference: <a href="https://help.splunk.com/en/security-offerings/splunk-user-behavior-analytics/get-data-in/5.4.1/add-other-data-to-splunk-uba/configure-powershell-logging-to-see-powershell-anomalies-in-splunk-uba">https://help.splunk.com/en/security-offerings/splunk-user-behavior-analytics/get-data-in/5.4.1/add-other-data-to-splunk-uba/configure-powershell-logging-to-see-powershell-anomalies-in-splunk-uba</a>.</li>
<li>Deploy the Sigma rule &ldquo;Detect Windows Defender Directory Removal via PowerShell&rdquo; to your SIEM to detect the specific <code>rmdir</code> command targeting the Windows Defender directory.</li>
<li>Review and tune the provided Sigma rules for false positives in your specific environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>powershell</category><category>defense-evasion</category><category>windows-defender</category><category>endpoint</category></item><item><title>Windows Defender Signature Retirement Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-win-defender-signature-retirement/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-win-defender-signature-retirement/</guid><description>An attacker disables Windows Defender's signature retirement feature by modifying a registry key, potentially reducing its effectiveness in detecting threats by allowing older, less relevant signatures to persist.</description><content:encoded><![CDATA[<p>Attackers may attempt to disable Windows Defender&rsquo;s signature retirement mechanism to weaken the endpoint protection. This is achieved by modifying the <code>DisableSignatureRetirement</code> registry value. Disabling signature retirement can prevent Windows Defender from removing outdated antivirus signatures, potentially reducing its effectiveness in detecting threats. Attackers may use this technique to evade detection by ensuring older, less effective signatures remain active, thereby reducing the likelihood of detecting their malicious activities. The tactic is used as part of defense evasion strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through unspecified means.</li>
<li>The attacker elevates privileges to obtain the necessary permissions to modify the Windows Registry.</li>
<li>The attacker uses a command-line tool like <code>reg.exe</code> or PowerShell to modify the registry.</li>
<li>The attacker targets the specific registry key: <code>HKLM\SOFTWARE\Microsoft\Windows Defender\NIS\Consumers\IPS</code>.</li>
<li>The attacker modifies the <code>DisableSignatureRetirement</code> registry value.</li>
<li>The attacker sets the <code>DisableSignatureRetirement</code> value to <code>0x00000001</code> to disable the signature retirement feature.</li>
<li>Windows Defender continues to use outdated signatures, which may be less effective against modern threats.</li>
<li>The attacker executes malicious code, evading detection due to the weakened signature database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling Windows Defender&rsquo;s signature retirement feature weakens the system&rsquo;s security posture. This allows outdated and less effective signatures to remain active, potentially leading to missed detections of newer threats. Successfully exploiting this vulnerability allows attackers to operate with reduced risk of detection, potentially leading to data breaches, malware infections, and other security incidents. The impact can affect individual endpoints as well as entire organizations relying on Windows Defender for primary threat protection.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect modifications to the <code>DisableSignatureRetirement</code> registry value (see rules).</li>
<li>Monitor Windows Registry events for unauthorized modifications to Windows Defender settings, specifically Event ID 13 from Sysmon (see rules and data_source).</li>
<li>Investigate any detected instances of <code>DisableSignatureRetirement</code> being set to <code>0x00000001</code> (see rules).</li>
<li>Implement strict access controls to prevent unauthorized modification of registry settings related to Windows Defender.</li>
<li>Tune the provided filter macro <code>windows_impair_defense_disable_win_defender_signature_retirement_filter</code> to reduce false positives in your environment (see search).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows-registry</category><category>windows-defender</category></item><item><title>Windows Defender Scan On Update Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-win-defender-scan-on-update/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-win-defender-scan-on-update/</guid><description>An attacker modifies the Windows registry to disable the Windows Defender Scan On Update feature, potentially evading detection and establishing persistence.</description><content:encoded><![CDATA[<p>This threat brief addresses the disabling of Windows Defender&rsquo;s &ldquo;Scan On Update&rdquo; feature through registry modifications. Attackers may target this setting to prevent automatic scans when signature updates are applied, thereby hindering real-time detection of malware and other threats. This technique can be employed to evade initial access detection or to maintain persistence on a compromised system. Specifically, the attack involves changing the &ldquo;DisableScanOnUpdate&rdquo; registry value to &ldquo;0x00000001&rdquo;. Disabling this feature, while not always indicative of malicious activity, significantly reduces the effectiveness of Windows Defender, making systems more susceptible to compromise. Defenders should monitor for unauthorized registry modifications related to Windows Defender settings.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker escalates privileges to obtain the necessary permissions to modify the registry.</li>
<li>The attacker uses a command-line tool (e.g., <code>reg.exe</code>, PowerShell) or a script to modify the <code>DisableScanOnUpdate</code> registry value.</li>
<li>The attacker changes the registry key <code>HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates\DisableScanOnUpdate</code> to a value of <code>0x00000001</code>.</li>
<li>Windows Defender no longer performs automatic scans upon signature updates.</li>
<li>The attacker deploys malware or other malicious payloads to the system without triggering immediate scans.</li>
<li>The attacker establishes persistence and continues to perform malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling the Windows Defender Scan On Update feature can significantly increase the dwell time of malware on a compromised system. This can lead to data breaches, system corruption, or further lateral movement within the network. The potential impact includes financial losses, reputational damage, and disruption of business operations. Systems that are not actively scanned are more vulnerable to both known and unknown threats, potentially impacting thousands of endpoints within an organization if the registry modification is widespread.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Registry Modification to Disable Windows Defender Scan On Update</code> to detect registry modifications related to the <code>DisableScanOnUpdate</code> setting.</li>
<li>Monitor Sysmon EventID 13 for registry modifications to the <code>HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates\DisableScanOnUpdate</code> path.</li>
<li>Investigate any instances where the <code>DisableScanOnUpdate</code> registry value is set to <code>0x00000001</code>.</li>
<li>Use endpoint detection and response (EDR) solutions to identify and block suspicious processes attempting to modify Windows Defender settings.</li>
<li>Tune the <code>windows_impair_defense_disable_win_defender_scan_on_update_filter</code> macro in Splunk to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>windows-defender</category></item><item><title>Windows Defender Real-time Signature Delivery Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-defender-signatures/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-defender-signatures/</guid><description>The following analytic detects modifications to the Windows registry that disable the Windows Defender real-time signature delivery feature, preventing timely malware definition updates and potentially leading to system compromise.</description><content:encoded><![CDATA[<p>This threat brief addresses the risk of adversaries disabling Windows Defender&rsquo;s real-time signature delivery mechanism. Attackers may modify specific registry entries to prevent Windows Defender from receiving the latest malware definitions. This activity significantly reduces the effectiveness of the endpoint security solution, creating a window of opportunity for malware to infect the system undetected. Disabling real-time signature delivery is a common defense evasion technique that allows malicious actors to bypass signature-based detection and establish a persistent presence on compromised systems. The technique is tracked as T1562.001 in MITRE ATT&amp;CK. The provided detections focus on registry modifications associated with the Windows Defender signature updates path.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system, possibly through phishing or exploiting a software vulnerability.</li>
<li>Attacker escalates privileges to gain administrative rights, required to modify the registry.</li>
<li>Attacker uses a command-line tool like <code>reg.exe</code> or PowerShell to modify the registry.</li>
<li>The attacker targets the specific registry path <code>*\\Windows Defender\\Signature Updates\\RealtimeSignatureDelivery</code>.</li>
<li>The attacker sets the <code>registry_value_data</code> to <code>&quot;0x00000000&quot;</code>, effectively disabling real-time signature updates.</li>
<li>Windows Defender no longer receives timely signature updates.</li>
<li>Malware is executed on the system, bypassing signature-based detection.</li>
<li>The attacker establishes persistence and performs malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of real-time signature delivery significantly weakens endpoint protection. Without timely signature updates, Windows Defender becomes unable to detect the latest malware variants. This can lead to widespread infection within the organization, potentially affecting hundreds or thousands of endpoints. Data breaches, financial losses, and reputational damage are likely consequences. The lack of real-time protection can also enable ransomware attacks and other destructive activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 13 to monitor registry modifications.</li>
<li>Deploy the Sigma rule &ldquo;Windows Defender Realtime Signature Delivery Disabled via Registry&rdquo; to detect registry changes disabling real-time signature delivery, and tune the rule for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, prioritizing systems where other suspicious activities have been observed.</li>
<li>Review and harden Group Policy settings to prevent unauthorized registry modifications.</li>
<li>Use the filter macro in the provided Splunk search to tune the search and reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows-defender</category><category>registry-modification</category><category>endpoint</category></item><item><title>Windows Defender MpEngine Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-defender-mpengine/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-defender-mpengine/</guid><description>An attacker modifies the Windows Defender MpEngine registry value to disable key features, potentially allowing malware to evade detection.</description><content:encoded><![CDATA[<p>Attackers, particularly those associated with IcedID campaigns, may attempt to disable Windows Defender to evade detection. This involves modifying the <code>MpEnablePus</code> registry value within the Windows Defender MpEngine settings, specifically setting it to <code>0x00000000</code>. This action effectively disables key features of Windows Defender, creating a window of opportunity for malware to execute undetected. The observed registry modification is a strong indicator of malicious intent, allowing attackers to gain a foothold and further compromise the system. The DFIR Report has documented instances of this technique being used in conjunction with IcedID leading to XingLocker ransomware deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through an unknown method (e.g., phishing, exploit).</li>
<li>The attacker obtains elevated privileges on the compromised system.</li>
<li>The attacker modifies the registry value <code>MpEnablePus</code> to <code>0x00000000</code> under the path <code>HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine</code>.</li>
<li>This registry change disables key Windows Defender features, weakening the endpoint&rsquo;s defenses.</li>
<li>The attacker deploys malware, such as IcedID, which can now operate with reduced interference from the disabled security product.</li>
<li>The malware establishes persistence through various mechanisms (e.g., scheduled tasks, registry run keys).</li>
<li>The attacker performs reconnaissance to identify valuable data and systems within the network.</li>
<li>The attacker moves laterally to other systems, potentially deploying ransomware such as XingLocker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of Windows Defender can lead to widespread malware infection and data compromise. Organizations may experience data breaches, financial losses, and reputational damage. The IcedID malware has been linked to XingLocker ransomware deployment, demonstrating the potential for significant impact following a successful attack. Disabling Windows Defender increases the dwell time of attackers and the likelihood of successful lateral movement and data exfiltration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon EventID 13 to capture registry modifications on endpoints.</li>
<li>Deploy the Sigma rule &ldquo;Detect Defender MpEngine Disabled via Registry Modification&rdquo; to identify suspicious registry changes related to Windows Defender.</li>
<li>Investigate any alerts generated by the Sigma rule, prioritizing systems where other suspicious activities have been observed.</li>
<li>Ensure Sysmon TA version 2.0 or higher is installed for accurate registry monitoring.</li>
<li>Review and harden Windows Defender configuration policies to prevent unauthorized modifications of critical settings.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>defense-evasion</category><category>registry-modification</category><category>windows-defender</category></item><item><title>Windows Defender File Hash Computation Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-win-defender-file-hashes/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-win-defender-file-hashes/</guid><description>Attackers may disable Windows Defender's ability to compute file hashes by modifying the EnableFileHashComputation registry value, impairing its malware detection capabilities.</description><content:encoded><![CDATA[<p>Attackers can disable Windows Defender&rsquo;s ability to detect and scan for malware by modifying specific registry settings. This involves setting the <code>EnableFileHashComputation</code> value to 0 within the Windows Defender registry path. Disabling this feature significantly impairs Windows Defender&rsquo;s capabilities, allowing attackers to bypass security measures and potentially execute undetected malware. This technique is particularly relevant as attackers continuously seek ways to evade traditional endpoint detection and response (EDR) systems. Disabling file hash computation hinders Defender&rsquo;s ability to identify malicious files based on their known hash values, making it harder to detect and prevent malware execution. This registry modification is a critical behavior to monitor, as it can be an early indicator of a compromised system or an attempted defense evasion tactic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the target system, possibly through phishing, exploitation of vulnerabilities, or compromised credentials.</li>
<li><strong>Privilege Escalation (if needed):</strong> The attacker escalates privileges to gain the necessary permissions to modify the Windows Registry.</li>
<li><strong>Identify Target Registry Key:</strong> The attacker identifies the specific registry key responsible for controlling Windows Defender&rsquo;s file hash computation: <code>HKLM\SOFTWARE\Microsoft\Windows Defender\MpEngine\EnableFileHashComputation</code>.</li>
<li><strong>Modify Registry Value:</strong> The attacker modifies the <code>EnableFileHashComputation</code> registry value to 0. This can be achieved through various tools, including <code>reg.exe</code>, PowerShell, or other scripting languages.</li>
<li><strong>Verify Modification:</strong> The attacker verifies that the registry value has been successfully modified.</li>
<li><strong>Execute Malicious Code:</strong> With file hash computation disabled, the attacker executes malicious code that would otherwise be detected by Windows Defender.</li>
<li><strong>Maintain Persistence:</strong> The attacker establishes persistence to maintain access to the compromised system.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally to other systems on the network, repeating the process if necessary.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling Windows Defender&rsquo;s file hash computation can significantly impact an organization&rsquo;s security posture. If successful, attackers can execute malware undetected, leading to data breaches, system compromise, and financial losses. The impact is amplified if attackers can disable this feature across multiple systems within the network. This technique is a critical component of defense evasion, as it allows malicious actors to operate with impunity on compromised systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Windows Defender File Hash Disable via Registry</code> to your SIEM and tune for your environment to detect the modification of the <code>EnableFileHashComputation</code> registry value.</li>
<li>Enable Sysmon Event ID 13 to ensure registry modification events are logged for the Sigma rule to function correctly.</li>
<li>Investigate any alerts triggered by the Sigma rule to determine the legitimacy of the registry modification and identify potential malicious activity.</li>
<li>Implement strict access controls to prevent unauthorized modifications to the Windows Registry.</li>
<li>Monitor for unexpected or unauthorized use of command-line tools like <code>reg.exe</code> and PowerShell to detect potential attempts to modify the registry.</li>
<li>Block the domains and URLs listed in the references to prevent downloading malicious tools.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>windows-defender</category></item><item><title>Windows Defender Enhanced Notification Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-disable-defender-enhanced-notification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-disable-defender-enhanced-notification/</guid><description>An attacker modifies the Windows Registry to disable Windows Defender's Enhanced Notification feature, preventing users from receiving security alerts and potentially allowing malicious activities to go unnoticed, ultimately enabling persistence and evasion.</description><content:encoded><![CDATA[<p>This brief focuses on the technique of disabling Windows Defender&rsquo;s Enhanced Notifications through registry modification. Attackers may target this feature to suppress security alerts, allowing malicious activities to proceed without user or administrator awareness. The observed behavior involves modifying the registry key <code>HKLM\SOFTWARE\Microsoft\Windows Defender\Reporting</code> and setting the <code>DisableEnhancedNotifications</code> value to <code>0x00000001</code>. This technique has been observed in conjunction with malware campaigns such as IcedID and XingLocker ransomware, documented in reports like TheDFIRReport&rsquo;s analysis of IcedID leading to XingLocker ransomware within 24 hours. This allows threat actors to bypass detection mechanisms and escalate their activities within a compromised environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of the system, potentially through phishing or exploit of a vulnerability.</li>
<li>Establish persistence, possibly through registry modifications or scheduled tasks.</li>
<li>The attacker executes a process with sufficient privileges to modify the Windows Registry.</li>
<li>The process modifies the registry key <code>HKLM\SOFTWARE\Microsoft\Windows Defender\Reporting</code>.</li>
<li>The value <code>DisableEnhancedNotifications</code> is set to <code>0x00000001</code>, disabling enhanced notifications.</li>
<li>Windows Defender no longer displays enhanced notifications, hiding security alerts from the user.</li>
<li>The attacker performs malicious activities, such as lateral movement or data exfiltration, without triggering user alerts.</li>
<li>The attacker achieves their final objective, such as deploying ransomware or stealing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling Windows Defender Enhanced Notifications can significantly reduce the visibility of malicious activities on a compromised system. This can lead to delayed detection and increased dwell time for attackers. In scenarios like the IcedID and XingLocker ransomware attacks, this delayed detection can enable rapid ransomware deployment, resulting in data encryption, system downtime, and potential financial losses. This technique undermines the effectiveness of Windows Defender as a primary security control, leading to a greater risk of successful attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 13 logging to monitor registry modifications.</li>
<li>Deploy the Sigma rule &ldquo;Registry Modification to Disable Defender Enhanced Notifications&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any endpoint registry modifications to <code>*Microsoft\\Windows Defender\\Reporting*</code> and <code>DisableEnhancedNotifications</code> using endpoint detection and response (EDR) logs.</li>
<li>Correlate detections of disabled Defender notifications with other suspicious activities, such as lateral movement or credential dumping, to identify potential compromises.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>registry-modification</category><category>windows-defender</category><category>persistence</category><category>evasion</category></item><item><title>Windows Defender ASR or Threat Configuration Tampering</title><link>https://feed.craftedsignal.io/briefs/2024-01-windows-defender-asr-tamper/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-windows-defender-asr-tamper/</guid><description>Adversaries tamper with Windows Defender's Attack Surface Reduction (ASR) rules or threat default actions using Add-MpPreference or Set-MpPreference commands, aiming to bypass the security tool for undetected malicious code execution.</description><content:encoded><![CDATA[<p>Attackers attempt to weaken or disable Windows Defender&rsquo;s defenses to evade detection and execute malicious activities unimpeded. This involves manipulating Attack Surface Reduction (ASR) rules and threat configurations using PowerShell commands such as <code>Add-MpPreference</code> and <code>Set-MpPreference</code>. These commands are used to modify how Windows Defender handles threats, potentially allowing malware to run without being flagged. This behavior is observed in environments where adversaries seek to establish persistence, execute malicious code, and maintain a foothold by disabling or altering security settings within Windows Defender. The tampering may involve setting specific actions for ASR rules to &ldquo;Allow&rdquo; or &ldquo;NoAction&rdquo;, effectively bypassing the intended protections.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the system through an unspecified method.</li>
<li>Privilege Escalation (if needed): The attacker escalates privileges to execute commands with administrative rights.</li>
<li>Discovery: The attacker identifies the presence and configuration of Windows Defender ASR rules.</li>
<li>Defense Evasion: The attacker executes PowerShell commands like <code>Add-MpPreference</code> or <code>Set-MpPreference</code> to disable or modify ASR rules. Specific parameters include <code>-AttackSurfaceReductionRules_Actions</code> and <code>-ThreatIDDefaultAction_Actions</code>.</li>
<li>Configuration Change: The attacker sets ASR rule actions to &ldquo;Allow&rdquo; or &ldquo;NoAction&rdquo; using values like &ldquo;<em>_Actions 6</em>&rdquo;, &ldquo;<em>_Actions 9</em>&rdquo;, or &ldquo;<em>_Actions 0</em>&rdquo;. They may also disable rules entirely using &ldquo;<em>Disabled</em>&rdquo;.</li>
<li>Persistence: With ASR rules weakened, the attacker establishes persistence through various methods, such as creating scheduled tasks or modifying registry keys.</li>
<li>Execution: The attacker executes malicious code that would have been blocked by Windows Defender before the ASR rules were modified.</li>
<li>Impact: The attacker achieves their objectives, such as data theft, system compromise, or deploying ransomware, without interference from Windows Defender.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful tampering with Windows Defender ASR or threat configurations enables attackers to bypass antivirus detection, maintain persistence, and execute malicious activities without interference. This can lead to widespread malware infections, data breaches, and significant damage to affected systems. If confirmed malicious, this behavior could severely compromise endpoint security, allowing attackers to operate undetected within the network, escalating the potential for significant data loss and system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Windows Defender ASR Configuration Tampering</code> to your SIEM to detect command-line executions indicative of ASR tampering and tune for your environment.</li>
<li>Enable Sysmon process creation logging to capture the command-line arguments used with <code>Add-MpPreference</code> and <code>Set-MpPreference</code> for the detection rule.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes modifying ASR rules or threat actions, to differentiate between legitimate administrative tasks and malicious activity.</li>
<li>Review and harden Windows Defender configuration policies, ensuring ASR rules are properly configured and protected from unauthorized modification.</li>
<li>Monitor Windows Event Log Security event ID 4688 for process creation events related to PowerShell and the specified commands.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows-defender</category><category>endpoint</category></item><item><title>PowerShell Used to Disable Windows Defender Security Monitoring</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-disable-security-monitoring/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-disable-security-monitoring/</guid><description>Attackers are using PowerShell commands with specific Set-MpPreference parameters to disable Windows Defender's real-time behavior monitoring, a common tactic for malware to evade detection and persist on compromised systems.</description><content:encoded><![CDATA[<p>Attackers are leveraging PowerShell to disable real-time security monitoring features in Windows Defender. This tactic involves using the <code>Set-MpPreference</code> cmdlet with specific parameters to turn off key security features like archive scanning, behavior monitoring, and real-time monitoring. This is often employed by malware, including Remote Access Trojans (RATs), bots, and Trojans, to evade antivirus detection. Disabling these protections allows attackers to operate undetected, potentially leading to data exfiltration, further system compromise, or the establishment of persistent access within the environment. The commands are often obfuscated or combined with other techniques to make detection more difficult. This activity represents a significant threat to organizations relying on Windows Defender for endpoint protection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the system through various means, such as exploiting a vulnerability or using compromised credentials.</li>
<li>Privilege Escalation: The attacker escalates privileges to gain necessary permissions to execute PowerShell commands that can modify Windows Defender settings.</li>
<li>Defense Evasion: The attacker executes PowerShell with <code>Set-MpPreference</code> to disable security features like <code>DisableRealtimeMonitoring</code>, <code>DisableBehaviorMonitoring</code>, or <code>DisableIOAVProtection</code>.</li>
<li>Configuration Changes: Windows Defender&rsquo;s real-time monitoring and other security features are disabled, reducing the system&rsquo;s ability to detect malicious activities.</li>
<li>Malware Deployment: With security monitoring disabled, the attacker deploys malware, such as RATs, bots, or Trojans, onto the system without immediate detection.</li>
<li>Persistence: The attacker establishes persistence mechanisms to maintain access to the compromised system, potentially using scheduled tasks or registry modifications.</li>
<li>Lateral Movement: The attacker moves laterally within the network, compromising additional systems and expanding their reach.</li>
<li>Data Exfiltration or Impact: The attacker exfiltrates sensitive data or carries out other malicious activities, such as deploying ransomware, while remaining undetected due to the disabled security monitoring.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of these PowerShell commands results in disabling Windows Defender&rsquo;s real-time protection and other security features. This can lead to undetected malware infections, data breaches, and system compromise. Organizations relying solely on Windows Defender are particularly vulnerable. The impact can range from individual workstation compromise to widespread network infection and significant data loss, depending on the attacker&rsquo;s objectives and the extent of their lateral movement.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect PowerShell commands attempting to disable Windows Defender features, and tune them for your environment.</li>
<li>Monitor process creation events (Sysmon Event ID 1 or Windows Event Log Security 4688) for PowerShell processes executing <code>Set-MpPreference</code> with parameters known to disable security features, as outlined in the Sigma rules.</li>
<li>Implement strict PowerShell execution policies to restrict the execution of unsigned or untrusted scripts, mitigating the risk of malicious PowerShell commands being executed.</li>
<li>Regularly review and audit Windows Defender settings to ensure that security features are enabled and functioning correctly, preventing unauthorized modifications.</li>
<li>Educate users about the risks of running untrusted PowerShell scripts and the importance of reporting suspicious activities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>powershell</category><category>windows-defender</category><category>defense-evasion</category><category>endpoint</category></item><item><title>Detecting Disabling of Windows Defender Sample Submission</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-defender-samples/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-defender-samples/</guid><description>An attacker modifies the Windows registry to disable the Windows Defender Submit Samples Consent feature, preventing the submission of suspicious files for analysis, and potentially evading detection.</description><content:encoded><![CDATA[<p>Attackers are increasingly targeting endpoint detection capabilities to evade security controls. One specific technique involves disabling Windows Defender&rsquo;s ability to automatically submit samples to Microsoft for analysis. By modifying the <code>SubmitSamplesConsent</code> registry value to 0, attackers can prevent suspicious files from being sent for further scrutiny, effectively blinding Defender. This can lead to successful malware execution and system compromise, as seen in incidents involving malware such as IcedID and XingLocker ransomware. This activity has been observed starting in late 2021 and continues to be a relevant evasion tactic. Detecting this registry modification is crucial for maintaining endpoint security.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploit).</li>
<li>The attacker escalates privileges to gain administrative rights.</li>
<li>The attacker uses a tool like <code>reg.exe</code> or PowerShell to modify the registry.</li>
<li>The attacker targets the registry key <code>HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet</code>.</li>
<li>The attacker changes the <code>SubmitSamplesConsent</code> value to <code>0x00000000</code>.</li>
<li>Windows Defender is now prevented from automatically submitting samples.</li>
<li>The attacker executes malware on the system without automatic sample submission.</li>
<li>The attacker achieves their objective, such as data theft or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling Windows Defender&rsquo;s sample submission feature allows attackers to execute malicious code undetected. This can lead to data breaches, system compromise, and ransomware infections. The DFIR Report has documented instances where disabling AV features was a critical step in successful ransomware attacks. Organizations that fail to detect this activity are at increased risk of significant financial and operational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon EventID 13 to monitor registry modifications (data_source).</li>
<li>Deploy the Sigma rule &ldquo;Disable Defender Submit Samples Consent Feature&rdquo; to detect the registry modification (rules).</li>
<li>Investigate any endpoint where the <code>SubmitSamplesConsent</code> registry value is set to <code>0x00000000</code> in the specified registry path (search).</li>
<li>Ensure Sysmon TA version 2.0 or later is installed for proper log ingestion (how_to_implement).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>windows-defender</category></item><item><title>Windows Defender Quick Scan Interval Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-win-defender-quick-scan-interval/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-win-defender-quick-scan-interval/</guid><description>Detection of modifications to the Windows registry that change the Windows Defender Quick Scan Interval, potentially impairing its ability to detect malware promptly.</description><content:encoded><![CDATA[<p>This threat brief focuses on the modification of the Windows Defender Quick Scan Interval, a critical setting that dictates how frequently quick scans are performed. Attackers may attempt to modify this interval to significantly reduce the frequency of scans, creating a window of opportunity to deploy malware or conduct malicious activities without being detected by Windows Defender&rsquo;s default quick scans. This technique is a form of defense evasion, allowing threats to persist undetected on compromised systems. The activity is detected through monitoring of registry modifications related to the &ldquo;QuickScanInterval&rdquo; path within the Windows registry. Disabling or significantly increasing this interval can have severe consequences, potentially leading to widespread infection and data compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to the system through various means, such as exploiting a software vulnerability, or social engineering.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges to gain the necessary permissions to modify the Windows Registry, often using techniques like exploiting system vulnerabilities or leveraging misconfigured access controls.</li>
<li><strong>Defense Evasion:</strong> The attacker attempts to disable or modify the Windows Defender Quick Scan Interval to prevent detection of malicious activities.</li>
<li><strong>Registry Modification:</strong> The attacker modifies the &ldquo;QuickScanInterval&rdquo; registry value using tools such as <code>reg.exe</code> or PowerShell. The specific registry path targeted is <code>*\Windows Defender\Scan\QuickScanInterval</code>.</li>
<li><strong>Persistence:</strong> By disabling or extending the quick scan interval, the attacker ensures their malware or malicious activities can persist on the system without being detected by regular quick scans.</li>
<li><strong>Malware Deployment:</strong> With Windows Defender&rsquo;s quick scans effectively neutered, the attacker deploys additional malware or executes malicious scripts on the compromised system.</li>
<li><strong>Lateral Movement:</strong> The attacker leverages the compromised system to move laterally within the network, infecting other systems and expanding their foothold.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the Windows Defender Quick Scan Interval can lead to a significant reduction in the system&rsquo;s ability to detect malware promptly. This can result in widespread infection, data breaches, and system compromise. The consequences include potential financial losses, reputational damage, and disruption of business operations. While the exact number of victims is difficult to quantify, the potential impact is significant, especially within organizations heavily reliant on Windows Defender as their primary security solution.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 13 logging to monitor registry modifications as described in the data source of the detection search.</li>
<li>Deploy the provided Splunk search to identify modifications to the Windows Defender Quick Scan Interval.</li>
<li>Investigate any detected modifications to the <code>QuickScanInterval</code> registry path to determine if they are legitimate or malicious.</li>
<li>Tune the provided filter macro <code>windows_impair_defense_change_win_defender_quick_scan_interval_filter</code> to reduce false positives in your environment.</li>
<li>Monitor for processes modifying the registry key <code>*\Windows Defender\Scan\QuickScanInterval</code> using tools like <code>reg.exe</code> or PowerShell.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows-registry</category><category>windows-defender</category><category>endpoint</category></item><item><title>PowerShell Windows Defender Exclusion Commands</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-defender-exclusion/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-defender-exclusion/</guid><description>Detection of PowerShell commands, specifically `Add-MpPreference` or `Set-MpPreference`, used to create Windows Defender exclusions, enabling attackers to bypass antivirus defenses and execute malicious code undetected.</description><content:encoded><![CDATA[<p>Attackers often attempt to evade detection by security tools, including Windows Defender. One common method is to add exclusions to prevent Defender from scanning specific files, folders, or processes. PowerShell, a powerful scripting language built into Windows, can be used to manage Defender settings, including exclusions. This makes it an attractive tool for adversaries. This activity is significant because adversaries often use it to bypass Windows Defender, allowing malicious code to execute without detection. If confirmed malicious, this behavior could enable attackers to evade antivirus defenses, maintain persistence, and execute further malicious activities undetected. The references provided show real-world examples of Remcos RAT and other malware families using this technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, potentially through phishing or exploitation of a vulnerability.</li>
<li>The attacker executes a PowerShell script.</li>
<li>The PowerShell script uses the <code>Add-MpPreference</code> or <code>Set-MpPreference</code> cmdlet.</li>
<li>The script specifies exclusion parameters, such as <code>-ExclusionPath</code>, <code>-ExclusionProcess</code>, or <code>-ExclusionExtension</code>.</li>
<li>The exclusion is added to Windows Defender, preventing it from scanning the specified files, folders, or processes.</li>
<li>The attacker deploys and executes malware within the excluded path or process.</li>
<li>Windows Defender does not detect the malware due to the exclusion.</li>
<li>The attacker achieves their objectives, such as data theft, system compromise, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique allows attackers to bypass Windows Defender&rsquo;s real-time protection, enabling them to execute malicious code undetected. This can lead to data breaches, system compromise, and other serious security incidents. Multiple threat actors, as demonstrated in the references, have used this technique in various campaigns. This results in malware infections, data exfiltration, and potential ransomware deployment, causing significant financial and reputational damage to affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging (EventCode 4104) to capture the commands being executed (data_source).</li>
<li>Deploy the Sigma rule <code>Detect-WindowsDefender-Exclusion</code> to detect suspicious PowerShell commands that add Windows Defender exclusions.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the user and destination involved (rule).</li>
<li>Review existing Windows Defender exclusions to identify any suspicious or unauthorized entries.</li>
<li>Monitor PowerShell execution for unusual or suspicious activity, especially related to Defender management.</li>
<li>Audit and restrict access to PowerShell, limiting its use to authorized personnel and processes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>windows-defender</category></item></channel></rss>