RoboMan
Level 38
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
High Reputation
Forum Veteran
Hello all. Hope you're doing alright.
I’ve been doing some testing around AMSI and Defender’s real-time protection pipeline in Windows 11, and I’m trying to understand the depth of their integration beyond the documented AMSI interface.
Let’s assume a scenario where a PowerShell payload is sufficiently obfuscated or memory-patched to evade AMSI inspection. My question is:
-Does Defender still perform any post-execution telemetry or behavioral correlation on that script’s activity (memory scanning, kernel-level telemetry, or anything else)?
In other words, is there a secondary detection surface that analyzes PowerShell or WSH activity independently of AMSI, or does AMSI act as the primary and only content feed for script-based scanning within Defender?
-If AMSI is bypassed, does Defender still retain visibility through other subsystems (like Antimalware Service Executable hooks, cloud heuristics, or Defender’s behavioral engine), or does it effectively lose script-layer context until malicious behavior manifests at a later stage?
I’ve read the public AMSI and Defender integration docs, but they don’t fully clarify how far the real-time engine correlates telemetry from AMSI to behavioral analysis to memory scanning when the first stage fails.
I appreciate any insight on the subject.
Cheers
I’ve been doing some testing around AMSI and Defender’s real-time protection pipeline in Windows 11, and I’m trying to understand the depth of their integration beyond the documented AMSI interface.
Let’s assume a scenario where a PowerShell payload is sufficiently obfuscated or memory-patched to evade AMSI inspection. My question is:
-Does Defender still perform any post-execution telemetry or behavioral correlation on that script’s activity (memory scanning, kernel-level telemetry, or anything else)?
In other words, is there a secondary detection surface that analyzes PowerShell or WSH activity independently of AMSI, or does AMSI act as the primary and only content feed for script-based scanning within Defender?
-If AMSI is bypassed, does Defender still retain visibility through other subsystems (like Antimalware Service Executable hooks, cloud heuristics, or Defender’s behavioral engine), or does it effectively lose script-layer context until malicious behavior manifests at a later stage?
I’ve read the public AMSI and Defender integration docs, but they don’t fully clarify how far the real-time engine correlates telemetry from AMSI to behavioral analysis to memory scanning when the first stage fails.
I appreciate any insight on the subject.
Cheers
