Detectionhighexperimental
Windows Credential Guard Disabled - Registry
Detects attempts to disable Windows Credential Guard by setting registry values to 0. Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. Adversaries may disable Credential Guard to gain access to sensitive credentials stored in the system, such as NTLM hashes and Kerberos tickets, which can be used for lateral movement and privilege escalation.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Swachchhanda Shrawan Poudel (Nextron Systems)Created Fri Dec 2673921b9c-cafd-4446-b0c6-fdb0ace42bc0windows
Log Source
WindowsRegistry Set
ProductWindows← raw: windows
CategoryRegistry Set← raw: registry_set
Detection Logic
Detection Logic1 selector
detection:
selection:
TargetObject|endswith:
- '\DeviceGuard\EnableVirtualizationBasedSecurity'
- '\DeviceGuard\LsaCfgFlags'
- '\Lsa\LsaCfgFlags'
Details: 'DWORD (0x00000000)'
condition: selectionFalse Positives
Unlikely
False positives are unlikely for most environments. High confidence detection.
References
MITRE ATT&CK
Tactics
Sub-techniques
Rule Metadata
Rule ID
73921b9c-cafd-4446-b0c6-fdb0ace42bc0
Status
experimental
Level
high
Type
Detection
Created
Fri Dec 26
Path
rules/windows/registry/registry_set/registry_set_credential_guard_disabled.yml
Raw Tags
attack.defense-evasionattack.t1562.001