Detectionmediumtest

Windows Defender Exclusion Registry Key - Write Access Requested

Detects write access requests to the Windows Defender exclusions registry keys. This could be an indication of an attacker trying to request a handle or access the object to write new exclusions in order to bypass security.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
@barryshooshooga, Nasreddine Bencherchali (Nextron Systems)Created Sat Oct 26Updated Sat Nov 11e9c8808f-4cfb-4ba9-97d4-e5f3beaa244dwindows
Log Source
Windowssecurity
ProductWindows← raw: windows
Servicesecurity← raw: security

Definition

Requirements: Audit Policy : Security Settings/Local Policies/Audit Policy, Registry System Access Control (SACL): Auditing/User

Detection Logic
Detection Logic1 selector
detection:
    selection:
        AccessList|contains:
            - '%%4417' # WriteData
            - '%%4418' # AppendData
        EventID:
            - 4656 # A handle to an object was requested.
            - 4663 # An attempt was made to access an object.
        ObjectName|contains: '\Microsoft\Windows Defender\Exclusions\'
    condition: selection
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

Rule Metadata
Rule ID
e9c8808f-4cfb-4ba9-97d4-e5f3beaa244d
Status
test
Level
medium
Type
Detection
Created
Sat Oct 26
Modified
Sat Nov 11
Path
rules/windows/builtin/security/win_security_windows_defender_exclusions_write_access.yml
Raw Tags
attack.defense-evasionattack.t1562.001
View on GitHub