heroui logo

Uninstall Crowdstrike Falcon Sensor

Sigma Rules

View Source
Summary
This detection rule is focused on identifying when the Crowdstrike Falcon Sensor, a security tool utilized for endpoint protection, is being uninstalled via a specific command line. Adversaries often try to eliminate security measures to evade detection, and disabling or uninstalling security software is a common tactic. The rule targets process creation events where the command line contains references to uninstalling the Falcon Sensor. Specifically, it looks for command lines that include 'WindowsSensor.exe' followed by '/uninstall' and '/quiet', indicating an attempt to silently remove the sensor without user interaction. The presence of this command line in the process creation logs could indicate malicious activity aimed at circumventing security mechanisms. Given that administrators might also use this command for legitimate purposes, the rule acknowledges potential false positives and recommends further investigation into such events to determine intent.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
ATT&CK Techniques
  • T1562.001
Created: 2021-07-12