Skip to content

Gasu16/Volatility3-tampering-plugin

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

36 Commits
 
 
 
 
 
 

Repository files navigation

A volatility plugin to detect Microsoft Windows Defender tampering

What is tampering?

  • It's a defense evasion technique accomplished by disabling or removing, even partially, defense tools such as Windows Defender or any other kind of AV/EDR/XDR platforms installed on a system

In which ways we can disable/tamper Windows Defender?

There are many ways Defender can be tampered, most commons are:

  • Edit registry key
  • sc.exe query|config|stop WinDefend
  • Run specific software like AdvancedRun utility by Nirsoft
  • taskkill command
  • SystemSettingsAdminFlows.exe, a native Windows Utility to detect Defender tampering
  • Via WMI tasks
  • Editing/Removing files related to Windows Defender folder path

How Memory Forensics can help us to investigate over tampering?

When it comes to EDR core business solutions like MS Defender, security specialists know that a fully functionally and up-to-date EDR is essential for the IT environment security, due to its advanced monitoring behaviour and analysis which can help to perform a quick response on the vast majority of threats.

However, Windows Defender just like others EDRs solutions are not really immune to tampering, which kinda interferee with their functionalities and even can turn off the product, allowing malware and threats to spread across the environment and increase damages to the systems such as PC clients, Servers, Mobiles, etc...

A real quick and useful move to detect if a tampering has been done is to read the correct Windows Registry values.

Usage

Tampering plugin comes with normal mode (no option, more detailed) and essential mode (through --essentials option) which aims to read only the essential registry keys that help to identify a tampering attempt

python3 vol.py -f memdump.dmp windows.registry.tampering

At this point, start to search for the registry keys changes.

An example of registry keys you can keep track of to detect if they've been edited are:

Key name Default value
DisableAntiSpyware 0
DisableAntiVirus 0
IsServiceRunning 1
PUAProtection 2
TamperProtection 5
TamperProtectionSource 64

You can easily detect the most important keys through the --essentials option like this:

python3 vol.py -f memdump.dmp windows.registry.tampering --essentials

Useful links

About

Volatility3 plugin contest 2024 about tampering MS Defender

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages