- engine_version: 220.127.116.114
- service_version: 18.104.22.1687
- tray_version: 22.214.171.1240
- EDR plugin version: 126.96.36.1998
For the MITRE ATT&CK Evaluation, Malwarebytes provided our Endpoint Protection & Response (EPR) product, which is designed to provide customers with a simple, yet powerful Endpoint Protection (EP) and Detection & Response (EDR) solution. It supports features such as exploit mitigation, malware detection via anomaly detection, granular endpoint isolation, cloud sandbox detonation, rollback of ransomware damages, application behavior monitoring, complete artifact remediation and a visual representation of suspicious activity. Malwarebytes EDR delivers an easy-to-use interface, with excellent detection capabilities.
With granular isolation, users can isolate any endpoint with a combination of three modes: network isolation (prevents inbound/outbound communication), process isolation (prevents any new processes from being spawned), and desktop isolation (prevents all user interaction). This level of granularity allows users to customize the isolation process while still maintaining control during an incident investigation.
Malwarebytes EDR uploads undetected suspicious executable files to the Malwarebytes cloud sandbox environment, where they are detonated for further analysis. By applying additional behavioral detection rules to the uploaded files, Malwarebytes provides an additional layer of protection against these suspicious files.
By backing up critical user files and registry settings, Malwarebytes can quickly recover (on the first sign of a possible ransomware attack) and revert affected files to their original uncompromised state. Ransomware rollback removes the need for organizations to recover using traditional, costly, and time-consuming re-imaging while maintaining file integrity.
Malwarebytes EDR provides robust detections through the use of behavioral rules which trigger suspicious activity on a series of connected windows events. These rules are optimized to effectively cover the MITRE ATT&CK tactics and techniques.
Additionally, there is a detailed graphical representation which shows the connections, spawned processes, and/or downloaded files that are part of the potential attack. Malwarebytes provides easy to use information about detected suspicious activity, such as all processes, files, and registry changes associated with it. Every suspicious activity is assigned a severity, which allows admins to filter out the “noise” and focus on items that need immediate attention.”
Finally, Malwarebytes EDR quickly detects any suspicious activity in customer’s environments, classifies it, and provides detailed information to let admins make informed decisions on how to mitigate the threat, saving both time and money while providing world class protection.
Policy Configuration for MITRE ATT&CK 2020 Detection Test
Policies -> Windows -> Settings
- Disable Real-Time Protection modules
- Enable “Capture experimental events”
- Enable EDR monitoring options
- Enable Ransomware Rollback and Endpoint Isolation
Policy Configuration for MITRE ATT&CK 2020 Protection Test
Policies -> Windows -> Settings
- Enable “Block penetration testing attacks”
- Enable RET ROP Gadget detection for both 32bit and 64bit applications