Windows Defender Tools in Non Standard Path
Description
The following analytic identifies usage of the MPCmdRun utility that can be abused by adversaries by moving it to a new directory.
- Type: Anomaly
-
Product: Splunk Behavioral Analytics
- Last Updated: 2022-07-18
- Author: Lou Stella, Splunk
- ID: c205bd2e-cd5b-4224-8510-578a2a1f83d7
Annotations
ATT&CK
Kill Chain Phase
- Exploitation
NIST
- DE.AE
CIS20
- CIS 10
CVE
Search
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
$main = from source
| eval timestamp = time
| eval metadata_uid = metadata.uid
| eval process_pid = process.pid
| eval process_file = process.file
| eval process_file_path = process_file.path
| eval process_file_name = process_file.name
| eval process_cmd_line = process.cmd_line
| eval actor_user = actor.user
| eval actor_user_name = actor_user.name
| eval actor_process = actor.process
| eval actor_process_pid = actor_process.pid
| eval actor_process_file = actor_process.file
| eval actor_process_file_path = actor_process_file.path
| eval actor_process_file_name = actor_process_file.name
| eval device_hostname = device.hostname
| where match(process_file_name, /(?i)mpcmdrun.exe/)=true AND (NOT match(process_file_path, /(?i)\\windows defender/)=true) AND (NOT match(process_file_path, /(?i)\\microsoft\\windows defender\\platform/)=true) --finding_report--
Macros
The SPL above uses the following Macros:
windows_defender_tools_in_non_standard_path_filter is a empty macro by default. It allows the user to filter out any results (false positives) without editing the SPL.
Required fields
List of fields required to use this analytic.
- process.pid
- process.file.path
- process.file.name
- process.cmd_line
- actor.user.name
- actor.process.pid
- actor.process.file.path
- actor.process.file.name
- device.hostname
How To Implement
Collect endpoint data such as sysmon or 4688 events.
Known False Positives
False positives may be present and filtering may be required.
Associated Analytic Story
RBA
| Risk Score | Impact | Confidence | Message |
|---|---|---|---|
| 56.0 | 70 | 80 | Process $process_name$ with commandline $process$ spawn in non-default folder path on host $dest_device_id$ |
The Risk Score is calculated by the following formula: Risk Score = (Impact * Confidence/100). Initial Confidence and Impact is set by the analytic author.
Reference
- https://attack.mitre.org/techniques/T1036/003/
- https://lolbas-project.github.io/lolbas/Binaries/MpCmdRun/
Test Dataset
Replay any dataset to Splunk Enterprise by using our replay.py tool or the UI.
Alternatively you can replay a dataset into a Splunk Attack Range
source | version: 4