EXPLORE
← Back to Explore
T1553.005

Mark-of-the-Web Bypass

Adversaries may abuse specific file formats to subvert Mark-of-the-Web (MOTW) controls. In Windows, when files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named <code>Zone.Identifier</code> with a specific value known as the MOTW.(Citation: Microsoft Zone.Identifier 2020) Files that are tagged with MOTW are protected and cannot perform certain actions. For example, starting in MS Office 10, if a MS Office file has the MOTW, it will open in Pro...

Windows
11
Detections
2
Sources
3
Threat Actors

BY SOURCE

6sigma5splunk_escu

PROCEDURES (8)

Container2 detections

Auto-extracted: 2 detections for container

Privilege2 detections

Auto-extracted: 2 detections for privilege

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

Bypass1 detections

Auto-extracted: 1 detections for bypass

Download1 detections

Auto-extracted: 1 detections for download

Event Log1 detections

Auto-extracted: 1 detections for event log

Download1 detections

Auto-extracted: 1 detections for download

Persist1 detections

Auto-extracted: 1 detections for persist

THREAT ACTORS (3)

DETECTIONS (11)