Skip to content

Commit fedac4a

Browse files
committed
Update amsi-on-mdav.md
1 parent b96cc13 commit fedac4a

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

defender-endpoint/amsi-on-mdav.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Because memory is volatile, and fileless malware doesn't place files on disk, es
4747

4848
Attackers use several fileless techniques that can make malware implants stealthy and evasive. These techniques include:
4949

50-
- **Reflective DLL injection**: Reflective DLL injection involves the manual loading of malicious DLLs into a process memory without the need for said DLLs to be on disk. The malicious DLL can be hosted on a remote attacker-controlled machine and delivered through a staged network channel (for example, Transport Layer Security (TLS) protocol), or embedded in obfuscated form inside infection vectors, like macros and scripts. This configuration results in the evasion of the OS mechanism that monitors and keeps track of loading executable modules. An example of malware that uses Reflective DLL injection is HackTool:Win32/Mikatz!dha.
50+
- **Reflective DLL injection**: Reflective DLL injection involves the manual loading of malicious DLLs into a process memory without the need for said DLLs to be on disk. The malicious DLL can be hosted on a remote attacker-controlled machine and delivered through a staged network channel (for example, Transport Layer Security (TLS) protocol), or embedded in obfuscated form inside infection vectors, like macros and scripts. This configuration results in the evasion of the OS mechanism that monitors and keeps track of loading executable modules. An example of malware that uses Reflective DLL injection is `HackTool:Win32/Mikatz!dha`.
5151

5252
- **Memory exploits**: Adversaries use fileless memory exploits to run arbitrary code remotely on victim machines. For example, the UIWIX threat uses the EternalBlue exploit, which was used by both Petya and WannaCry, to install the DoublePulsar backdoor, and lives entirely in the kernel's memory (SMB Dispatch Table). Unlike Petya and Wannacry, UIWIX doesn't drop any files on disk.
5353

@@ -81,15 +81,15 @@ AMSI provides a deeper level of inspection for malicious software that employs o
8181
- .NET Framework 4.8 or newer (scanning of all assemblies)
8282
- Windows Management Instrumentation (WMI)
8383

84-
If you use Microsoft Office 365, AMSI also supports JavaScript, VBA, and XLM.
84+
If you use Microsoft 365 Apps, AMSI also supports JavaScript, VBA, and XLM.
8585

8686
AMSI doesn't currently support Python or Perl.
8787

8888
### Enabling AMSI
8989

90-
To enable AMSI, you need to enable Script scanning. See [Configure scanning options for Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md)
90+
To enable AMSI, you need to enable script scanning. See [Configure scanning options for Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md).
9191

92-
Also see [Defender Policy CSP - Windows Client Management](/windows/client-management/mdm/policy-csp-defender)
92+
Also see [Defender Policy CSP - Windows Client Management](/windows/client-management/mdm/policy-csp-defender).
9393

9494
### AMSI resources
9595

0 commit comments

Comments
 (0)