From 5da267eb4aaa6ea0aefdc58aee1a5ecdc4ea9062 Mon Sep 17 00:00:00 2001 From: rabbitstack Date: Tue, 29 Apr 2025 22:06:46 +0200 Subject: [PATCH] feat(rules): Windows Defender protection tampering via registry Detects suspicious processes modifying Windows Defender configuration settings via registry to disable protection features. --- ...nder_protection_tampering_via_registry.yml | 65 +++++++++++++++++++ 1 file changed, 65 insertions(+) create mode 100644 rules/defense_evasion_windows_defender_protection_tampering_via_registry.yml diff --git a/rules/defense_evasion_windows_defender_protection_tampering_via_registry.yml b/rules/defense_evasion_windows_defender_protection_tampering_via_registry.yml new file mode 100644 index 000000000..615dad6c4 --- /dev/null +++ b/rules/defense_evasion_windows_defender_protection_tampering_via_registry.yml @@ -0,0 +1,65 @@ +name: Windows Defender protection tampering via registry +id: 47ad962b-be0f-44f8-9467-34109f41e5ff +version: 1.0.0 +description: | + Detects suspicious processes modifying Windows Defender configuration settings via registry + to disable protection features. +labels: + tactic.id: TA0005 + tactic.name: Defense Evasion + tactic.ref: https://attack.mitre.org/tactics/TA0005/ + technique.id: T1562 + technique.name: Impair Defenses + technique.ref: https://attack.mitre.org/techniques/T1562/ + subtechnique.id: T1562.001 + subtechnique.name: Disable or Modify Tools + subtechnique.ref: https://attack.mitre.org/techniques/T1562/001 +references: + - https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker + +condition: > + set_value + and + ((base(registry.path) iin + ( + 'DisableAntiSpyware', + 'DisableAntiVirus', + 'DisableBehaviorMonitoring', + 'DisableBlockAtFirstSeen', + 'DisableEnhancedNotifications', + 'DisableIntrusionPreventionSystem', + 'DisableIOAVProtection', + 'DisableOnAccessProtection', + 'DisableRealtimeMonitoring', + 'DisableScanOnRealtimeEnable', + 'DisableScriptScanning', + 'DisableArchiveScanning', + 'DisableRawWriteNotification' + ) and registry.value = 1) + or + (registry.path imatches + ( + '*\\Windows Defender\\Spynet\\SpyNetReporting', + '*\\Windows Defender\\Spynet\\SubmitSamplesConsent', + '*\\DisallowExploitProtectionOverride', + '*\\Windows Defender\\Features\\TamperProtection', + '*\\Windows Defender\\MpEngine\\MpEnablePus' + ) and registry.value = 0 + ) + ) + and + ps.exe not imatches + ( + '?:\\Program Files\\Symantec\\Symantec Endpoint Protection\\sepWscSvc64.exe', + '?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\ConfigSecurityPolicy.exe', + '?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\MsMpEng.exe', + '?:\\ProgramData\\Microsoft\\Windows Defender\\*\\NisSrv.exe' + ) +action: + - name: kill + +output: > + Suspicious process %ps.exe tampered Windows Defender security settings in registry value %registry.path +severity: high + +min-engine-version: 2.4.0