Exploitation for Defense Evasion
Adversaries may exploit a system or application vulnerability to bypass security features. Exploitation of a vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Vulnerabilities may exist in defensive security software that can be used to disable or circumvent them. Adversaries may have prior knowledge through reconnaissance that security software exists within an environment or they may perform checks during or shortly after the system is compromised for Security Software Discovery. There have also been examples of vulnerabilities in public cloud infrastructure and SaaS applications that may bypass defense boundaries, evade security logs, or deploy hidden infrastructure.
let SecurityProcesses = dynamic([
"MsMpEng.exe", "MsSense.exe", "SenseCncProxy.exe", "SenseIR.exe",
"csagent.exe", "CSFalconService.exe", "CSFalconContainer.exe",
"SentinelAgent.exe", "SentinelServiceHost.exe", "SentinelStaticEngine.exe",
"CylanceSvc.exe", "CylanceUI.exe",
"cb.exe", "CbDefense.exe", "CbDefenseService.exe",
"mbam.exe", "MBAMService.exe",
"sophosssp.exe", "SophosSafestore.exe", "SAVService.exe",
"avp.exe", "avpui.exe",
"avgnt.exe", "avguard.exe",
"SEDService.exe", "SpybotSD.exe",
"aswBoot.exe", "AvastSvc.exe"
]);
let ExploitChildProcesses = dynamic([
"cmd.exe", "powershell.exe", "pwsh.exe", "wscript.exe", "cscript.exe",
"mshta.exe", "rundll32.exe", "regsvr32.exe", "certutil.exe",
"bitsadmin.exe", "msiexec.exe", "csc.exe", "msbuild.exe",
"wmic.exe", "net.exe", "net1.exe", "sc.exe"
]);
// Signal 1: Security software spawning suspicious child processes (post-exploitation execution)
let ExploitedSecurityProcess = DeviceProcessEvents
| where Timestamp > ago(24h)
| where InitiatingProcessFileName has_any (SecurityProcesses)
| where FileName has_any (ExploitChildProcesses)
| extend DetectionSignal = "SecuritySoftwareSpawnedSuspiciousChild"
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
InitiatingProcessFileName, InitiatingProcessCommandLine, DetectionSignal;
// Signal 2: Security processes accessing other processes with PROCESS_ALL_ACCESS or PROCESS_VM_WRITE
// (OpenProcess calls against security tools — precursor to exploitation)
let SecurityProcessAccess = DeviceEvents
| where Timestamp > ago(24h)
| where ActionType == "ProcessAccessed"
| where FileName has_any (SecurityProcesses)
| where InitiatingProcessFileName !has_any (SecurityProcesses)
| where InitiatingProcessFileName !in~ ("System", "svchost.exe", "lsass.exe", "csrss.exe", "wininit.exe", "services.exe", "smss.exe")
| extend DetectionSignal = "SuspiciousAccessToSecurityProcess"
| project Timestamp, DeviceName, AccountName,
FileName, InitiatingProcessFileName, InitiatingProcessCommandLine, DetectionSignal;
// Signal 3: Security service unexpectedly stopping (possible crash-based exploitation)
let SecurityServiceStop = DeviceEvents
| where Timestamp > ago(24h)
| where ActionType == "ServiceInstalled" or ActionType == "ServiceDeleted"
| where AdditionalFields has_any (SecurityProcesses)
| extend DetectionSignal = "SecurityServiceModifiedOrStopped"
| project Timestamp, DeviceName, AccountName,
AdditionalFields, InitiatingProcessFileName, InitiatingProcessCommandLine, DetectionSignal;
// Union all signals
union ExploitedSecurityProcess, SecurityProcessAccess, SecurityServiceStop
| sort by Timestamp desc Data Sources
Required Tables
False Positives
- Security software updates may spawn cmd.exe or PowerShell as part of self-update or installer routines
- Endpoint management platforms (SCCM, Intune, BigFix) may access security software processes during health checks or remediation
- Legitimate security tools performing process inspection (SysInternals, vulnerability scanners) may open handles to security processes
- Vendor-provided diagnostic or support tools for the security product itself may trigger process access alerts
- Windows Error Reporting (WerFault.exe) opens handles to crashed processes including security software during crash dump collection
References (9)
- https://attack.mitre.org/techniques/T1211/
- https://www.bleepingcomputer.com/news/security/hackers-exploited-salesforce-zero-day-in-facebook-phishing-attack/
- https://securitylabs.datadoghq.com/articles/bypass-cloudtrail-aws-service-catalog-and-other/
- https://www.bleepingcomputer.com/news/security/ghosttoken-gcp-flaw-let-attackers-backdoor-google-accounts/
- https://learn.microsoft.com/en-us/defender-endpoint/advanced-hunting-deviceevents-table
- https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1211/T1211.md
- https://www.bitdefender.com/blog/labs/apt28-targets-ongoing-conflict-ukraine/
- https://learn.microsoft.com/en-us/windows/win32/procthread/process-security-and-access-rights
Unlock Pro Content
Get the full detection package for T1211 including response playbook, investigation guide, and atomic red team tests.