The researchers found that Microsoft Defender’s command line tool “MpCmdRun.exe” was abused to side-load malicious DLLs that decrypt and install Cobalt Strike beacons on victims’ PCs. For those unaware, MpCmdRun is an important part of Microsoft’s Windows Security system that helps protect your PC from online threats and malware. “During a recent investigation, we found that threat actors were abusing the Windows Defender command line tool MpCmdRun.exe to decrypt and load Cobalt Strike payloads,” SentinelOne wrote in detail about the new attack in its blog post.

  The initial target compromise in both cases occurred by exploiting the Log4j vulnerability against an unpatched VMWare Horizon Server to run PowerShell code, which downloaded the MpCmdRun.exe, the “mpclient” malicious DLL file, and the encrypted Cobalt Strike payload file from its Command-and-Control (C2) server.  The threat actor downloads a malicious DLL, the encrypted payload, and the legitimate tool from their controlled C2:  Notably, the threat actor leverages the legitimate Windows Defender command line tool MpCmdRun.exe to decrypt and load Cobalt Strike payloads. […] MpCmd.exe (sic) is abused to side-load a weaponized mpclient.dll, which loads and decrypts Cobalt Strike Beacon from the c0000015.log file. As such, the components used in the attack specifically related to the use of the Windows Defender command line tool are: For more technical details, you can check out the official blog post here.

LockBit Operators Abusing Microsoft Defender To Load Cobalt Strike Beacon - 75