

Monitor files (especially those downloaded from untrusted locations) for MOTW attributes. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities. Monitor compressed/archive and image files downloaded from the Internet as the contents may not be tagged with the MOTW. Consider unregistering container file extensions in Windows File Explorer. Ĭonsider blocking container file types at web and/or email gateways. Note: this will not deactivate the mount functionality itself. This can be achieved by modifying the Registry values related to the Windows Explorer file associations in order to disable the automatic Explorer "Mount and Burn" dialog for these file extensions. Ĭonsider disabling auto-mounting of disk image files (i.e. ĪPT29 has embedded ISO images and VHDX files in HTML to evade Mark-of-the-Web. Īmadey has modified the :Zone.Identifier in the ADS area to zero. After a container file is extracted and/or mounted, the files contained within them may be treated as local files on disk and run without protections. MOTW is a NTFS feature and many container files do not support NTFS alternative data streams. Container files downloaded from the Internet will be marked with MOTW but the files within may not inherit the MOTW after the container files are extracted and/or mounted. vhd) file formats to deliver malicious payloads that may not be tagged with MOTW. Īdversaries may abuse container files such as compressed/archive (.arj. If the file in not known/trusted, SmartScreen will prevent the execution and warn the user not to run it.

Executables tagged with the MOTW will be processed by Windows Defender SmartScreen that compares files with an allowlist of well-known executables. For example, starting in MS Office 10, if a MS Office file has the MOTW, it will open in Protected View. Files that are tagged with MOTW are protected and cannot perform certain actions. In Windows, when files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW. Adversaries may abuse specific file formats to subvert Mark-of-the-Web (MOTW) controls.
