Detectionhightest
Disable Windows Defender Functionalities Via Registry Keys
Detects when attackers or tools disable Windows Defender functionalities via the Windows registry
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
AlertIQ, Ján Trenčanský, François Hubaut, Nasreddine Bencherchali (Nextron Systems), Swachchhanda Shrawan PoudelCreated Mon Aug 01Updated Mon Oct 070eb46774-f1ab-4a74-8238-1155855f2263windows
Log Source
WindowsRegistry Set
ProductWindows← raw: windows
CategoryRegistry Set← raw: registry_set
Detection Logic
Detection Logic4 selectors
detection:
selection_main:
TargetObject|contains:
- '\SOFTWARE\Microsoft\Windows Defender\'
- '\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\'
- '\SOFTWARE\Policies\Microsoft\Windows Defender\'
selection_dword_1:
TargetObject|endswith:
- '\DisableAntiSpyware'
- '\DisableAntiVirus'
- '\DisableBehaviorMonitoring'
- '\DisableBlockAtFirstSeen'
- '\DisableEnhancedNotifications'
- '\DisableIntrusionPreventionSystem'
- '\DisableIOAVProtection'
- '\DisableOnAccessProtection'
- '\DisableRealtimeMonitoring'
- '\DisableScanOnRealtimeEnable'
- '\DisableScriptScanning'
Details: 'DWORD (0x00000001)'
selection_dword_0:
TargetObject|endswith:
- '\DisallowExploitProtectionOverride'
- '\Features\TamperProtection'
- '\MpEngine\MpEnablePus'
- '\PUAProtection'
- '\Signature Update\ForceUpdateFromMU'
- '\SpyNet\SpynetReporting'
- '\SpyNet\SubmitSamplesConsent'
- '\Windows Defender Exploit Guard\Controlled Folder Access\EnableControlledFolderAccess'
Details: 'DWORD (0x00000000)'
filter_optional_symantec:
Image|startswith: 'C:\Program Files\Symantec\Symantec Endpoint Protection\'
Image|endswith: '\sepWscSvc64.exe'
condition: selection_main and 1 of selection_dword_* and not 1 of filter_optional_*False Positives
Administrator actions via the Windows Defender interface
Third party Antivirus
MITRE ATT&CK
Tactics
Sub-techniques
Related Rules
Similar
Rule not founda64e4198-c1c8-46a5-bc9c-324c86455fd4
Similar
Rule not foundfd115e64-97c7-491f-951c-fc8da7e042fa
Rule Metadata
Rule ID
0eb46774-f1ab-4a74-8238-1155855f2263
Status
test
Level
high
Type
Detection
Created
Mon Aug 01
Modified
Mon Oct 07
Author
Path
rules/windows/registry/registry_set/registry_set_windows_defender_tamper.yml
Raw Tags
attack.defense-evasionattack.t1562.001