|
| 1 | +name: Windows Defender protection tampering via registry |
| 2 | +id: 47ad962b-be0f-44f8-9467-34109f41e5ff |
| 3 | +version: 1.0.0 |
| 4 | +description: | |
| 5 | + Detects suspicious processes modifying Windows Defender configuration settings via registry |
| 6 | + to disable protection features. |
| 7 | +labels: |
| 8 | + tactic.id: TA0005 |
| 9 | + tactic.name: Defense Evasion |
| 10 | + tactic.ref: https://attack.mitre.org/tactics/TA0005/ |
| 11 | + technique.id: T1562 |
| 12 | + technique.name: Impair Defenses |
| 13 | + technique.ref: https://attack.mitre.org/techniques/T1562/ |
| 14 | + subtechnique.id: T1562.001 |
| 15 | + subtechnique.name: Disable or Modify Tools |
| 16 | + subtechnique.ref: https://attack.mitre.org/techniques/T1562/001 |
| 17 | +references: |
| 18 | + - https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker |
| 19 | + |
| 20 | +condition: > |
| 21 | + set_value |
| 22 | + and |
| 23 | + ((base(registry.path) iin |
| 24 | + ( |
| 25 | + 'DisableAntiSpyware', |
| 26 | + 'DisableAntiVirus', |
| 27 | + 'DisableBehaviorMonitoring', |
| 28 | + 'DisableBlockAtFirstSeen', |
| 29 | + 'DisableEnhancedNotifications', |
| 30 | + 'DisableIntrusionPreventionSystem', |
| 31 | + 'DisableIOAVProtection', |
| 32 | + 'DisableOnAccessProtection', |
| 33 | + 'DisableRealtimeMonitoring', |
| 34 | + 'DisableScanOnRealtimeEnable', |
| 35 | + 'DisableScriptScanning', |
| 36 | + 'DisableArchiveScanning', |
| 37 | + 'DisableRawWriteNotification' |
| 38 | + ) and registry.value = 1) |
| 39 | + or |
| 40 | + (registry.path imatches |
| 41 | + ( |
| 42 | + '*\\Windows Defender\\Spynet\\SpyNetReporting', |
| 43 | + '*\\Windows Defender\\Spynet\\SubmitSamplesConsent', |
| 44 | + '*\\DisallowExploitProtectionOverride', |
| 45 | + '*\\Windows Defender\\Features\\TamperProtection', |
| 46 | + '*\\Windows Defender\\MpEngine\\MpEnablePus' |
| 47 | + ) and registry.value = 0 |
| 48 | + ) |
| 49 | + ) |
| 50 | + and |
| 51 | + ps.exe not imatches |
| 52 | + ( |
| 53 | + '?:\\Program Files\\Symantec\\Symantec Endpoint Protection\\sepWscSvc64.exe', |
| 54 | + '?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\ConfigSecurityPolicy.exe', |
| 55 | + '?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\MsMpEng.exe', |
| 56 | + '?:\\ProgramData\\Microsoft\\Windows Defender\\*\\NisSrv.exe' |
| 57 | + ) |
| 58 | +action: |
| 59 | + - name: kill |
| 60 | + |
| 61 | +output: > |
| 62 | + Suspicious process %ps.exe tampered Windows Defender security settings in registry value %registry.path |
| 63 | +severity: high |
| 64 | + |
| 65 | +min-engine-version: 2.4.0 |
0 commit comments