<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Windowsdefender — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/windowsdefender/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/windowsdefender/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Defender Exclusion Added or Modified via Command Line</title><link>https://feed.craftedsignal.io/briefs/2024-01-defender-exclusion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-defender-exclusion/</guid><description>Adversaries use Add-MpPreference or Set-MpPreference commands to add exclusions in Windows Defender, allowing malicious code to execute undetected, and this activity can be detected via Endpoint Detection and Response (EDR) agents.</description><content:encoded><![CDATA[<p>Attackers often attempt to evade detection by security tools like Windows Defender. One common technique involves adding exclusions to prevent Defender from scanning or detecting malicious files, processes, or network activity. This is often achieved by using the <code>Add-MpPreference</code> or <code>Set-MpPreference</code> PowerShell cmdlets, which can modify Defender&rsquo;s configuration. These commands are used to specify files, folders, or processes that Defender should ignore during scans. Once an exclusion is successfully added, malicious code can execute without being detected by Windows Defender. This is a significant concern for defenders because it directly undermines the effectiveness of the built-in antivirus solution. The activity detected here stems from endpoint telemetry and can often be associated with malware families such as Remcos RAT, AgentTesla, ValleyRAT, XWorm and others.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access through various means, such as phishing emails or exploiting vulnerabilities in software.</li>
<li>Privilege Escalation: Once inside the system, the attacker escalates privileges to gain administrative access, which is required to modify Windows Defender settings.</li>
<li>Discovery: The attacker performs reconnaissance to understand the system&rsquo;s configuration, including the presence and configuration of Windows Defender.</li>
<li>Defense Evasion: The attacker uses <code>Add-MpPreference</code> or <code>Set-MpPreference</code> in PowerShell to add exclusions to Windows Defender, targeting specific files, folders, or processes used by the malware. This bypasses real-time scanning and detection.</li>
<li>Execution: The attacker executes malicious code, which can now run without being detected by Windows Defender due to the added exclusions.</li>
<li>Persistence: The attacker establishes persistence by creating scheduled tasks or modifying registry keys, ensuring that the malicious code continues to run even after a system reboot. The exclusions remain in place to allow continued operation.</li>
<li>Command and Control: The malware establishes communication with a command and control (C2) server to receive further instructions and exfiltrate data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass Windows Defender, leading to undetected malware execution and potentially enabling further malicious activities, such as data theft, ransomware deployment, or system compromise. The number of affected systems depends on the scope of the initial compromise, but the impact can be widespread if the attacker gains access to critical systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture the command-line arguments used when adding Defender exclusions, which is essential for triggering the rules below.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious <code>Add-MpPreference</code> or <code>Set-MpPreference</code> usage and tune them to your environment.</li>
<li>Investigate any instances of <code>Add-MpPreference</code> or <code>Set-MpPreference</code> commands, especially those initiated by unusual parent processes or users.</li>
<li>Regularly review and audit Windows Defender exclusions to identify and remove any unauthorized or suspicious entries.</li>
<li>Monitor the references for IoCs related to malware families abusing Windows Defender exclusions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>windowsdefender</category><category>exclusion</category><category>defense-evasion</category><category>endpoint</category></item></channel></rss>