Skip to content

Commit 78c98cf

Browse files
committed
feat(rules): Windows Defender protection tampering via registry
Detects suspicious processes modifying Windows Defender configuration settings via registry to disable protection features.
1 parent bd0f9a0 commit 78c98cf

File tree

1 file changed

+65
-0
lines changed

1 file changed

+65
-0
lines changed
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
name: Windows Defender protection tampering via registry
2+
id: 47ad962b-be0f-44f8-9467-34109f41e5ff
3+
version: 1.0.0
4+
description: |
5+
Detects suspicious processes modifying Windows Defender configuration settings via registry
6+
to disable protection features.
7+
labels:
8+
tactic.id: TA0005
9+
tactic.name: Defense Evasion
10+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
11+
technique.id: T1562
12+
technique.name: Impair Defenses
13+
technique.ref: https://attack.mitre.org/techniques/T1562/
14+
subtechnique.id: T1562.001
15+
subtechnique.name: Disable or Modify Tools
16+
subtechnique.ref: https://attack.mitre.org/techniques/T1562/001
17+
references:
18+
- https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker
19+
20+
condition: >
21+
set_value
22+
and
23+
((base(registry.path) iin
24+
(
25+
'DisableAntiSpyware',
26+
'DisableAntiVirus',
27+
'DisableBehaviorMonitoring',
28+
'DisableBlockAtFirstSeen',
29+
'DisableEnhancedNotifications',
30+
'DisableIntrusionPreventionSystem',
31+
'DisableIOAVProtection',
32+
'DisableOnAccessProtection',
33+
'DisableRealtimeMonitoring',
34+
'DisableScanOnRealtimeEnable',
35+
'DisableScriptScanning',
36+
'DisableArchiveScanning',
37+
'DisableRawWriteNotification'
38+
) and registry.value = 1)
39+
or
40+
(registry.path imatches
41+
(
42+
'*\\Windows Defender\\Spynet\\SpyNetReporting',
43+
'*\\Windows Defender\\Spynet\\SubmitSamplesConsent',
44+
'*\\DisallowExploitProtectionOverride',
45+
'*\\Windows Defender\\Features\\TamperProtection',
46+
'*\\Windows Defender\\MpEngine\\MpEnablePus'
47+
) and registry.value = 0
48+
)
49+
)
50+
and
51+
ps.exe not imatches
52+
(
53+
'?:\\Program Files\\Symantec\\Symantec Endpoint Protection\\sepWscSvc64.exe',
54+
'?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\ConfigSecurityPolicy.exe',
55+
'?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\MsMpEng.exe',
56+
'?:\\ProgramData\\Microsoft\\Windows Defender\\*\\NisSrv.exe'
57+
)
58+
action:
59+
- name: kill
60+
61+
output: >
62+
Suspicious process %ps.exe tampered Windows Defender security settings in registry value %registry.path
63+
severity: high
64+
65+
min-engine-version: 2.4.0

0 commit comments

Comments
 (0)