heroui logo

Disable AMSI Through Registry

Splunk Security Content

View Source
Summary
This detection rule identifies modifications to the Windows registry that disable the Antimalware Scan Interface (AMSI), specifically looking for changes to the registry value 'AmsiEnable' being set to '0x00000000'. This is particularly concerning as disabling AMSI is a common tactic employed by malicious actors, including ransomware, Remote Access Trojans (RATs), and Advanced Persistent Threats (APTs), to evade detection by security solutions. The detection leverages Sysmon Event IDs 12 and 13 to monitor the relevant registry path under 'SOFTWARE\Microsoft\Windows Script\Settings'. If this mechanism is successfully modified, it may allow attackers to execute malicious payloads with reduced chances of detection, prompting the need for thorough monitoring and response to such events.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Script
ATT&CK Techniques
  • T1562.001
  • T1562
Created: 2024-12-08