
Summary
This detection rule focuses on identifying potential tampering with Windows Defender's configurations, particularly through the use of the Windows Management Instrumentation Command-line (wmic.exe) utility. The rule triggers when wmic.exe is used to execute commands targeting the Windows Defender namespace, specifically by checking for command lines that include `/Namespace:\\root\Microsoft\Windows\Defender`. This may indicate malicious attempts to modify Defender’s settings, such as adding exclusions for certain file paths, thereby allowing malware to bypass detection. The detection logic is structured around criteria for identifying the wmic executable, ensuring that variations in its path do not evade detection. The high severity level indicates the significant risk associated with such tampering activities, highlighting the need for thorough monitoring of Windows Defender's integrity.
Categories
- Windows
Data Sources
- Process
ATT&CK Techniques
- T1562.001
Created: 2022-12-11