Detectionmediumtest

Dism Remove Online Package

Deployment Image Servicing and Management tool. DISM is used to enumerate, install, uninstall, configure, and update features and packages in Windows images

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
François HubautCreated Sun Jan 16Updated Fri Aug 2643e32da2-fdd0-4156-90de-50dfd62636f9windows
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation

Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.

Detection Logic
Detection Logic2 selectors
detection:
    selection_dismhost:
        Image|endswith: '\DismHost.exe'
        ParentCommandLine|contains|all:
            - '/Online'
            - '/Disable-Feature'
            # - '/FeatureName:'
            # - '/Remove'
            # /NoRestart
            # /quiet
    selection_dism:
        Image|endswith: '\Dism.exe'
        CommandLine|contains|all:
            - '/Online'
            - '/Disable-Feature'
            # - '/FeatureName:'
            # - '/Remove'
            # /NoRestart
            # /quiet
    condition: 1 of selection_*
False Positives

Legitimate script

Testing & Validation

Simulations

atomic-red-teamT1562.001
View on ART

Disable Windows Defender with DISM

GUID: 871438ac-7d6e-432a-b27d-3e7db69faf58

Regression Tests

by SigmaHQ Team
Positive Detection Test1 matchevtx

Microsoft-Windows-Sysmon

Rule Metadata
Rule ID
43e32da2-fdd0-4156-90de-50dfd62636f9
Status
test
Level
medium
Type
Detection
Created
Sun Jan 16
Modified
Fri Aug 26
Path
rules/windows/process_creation/proc_creation_win_dism_remove.yml
Raw Tags
attack.defense-evasionattack.t1562.001
View on GitHub