heroui logo

Defender Registry Values Modified

Anvilogic Forge

View Source
Summary
The 'Defender Registry Values Modified' detection rule identifies potentially malicious activity targeting Windows Defender settings via modifications in the Windows Registry. Adversaries often manipulate registry keys to disable or alter the behavior of security tools in order to evade detection and persist in their activities. This rule is particularly focused on commands executed from common command-line interfaces like 'cmd.exe' and 'PowerShell' that relate to disabling or altering key features of Windows Defender, such as enabling or disabling real-time protection and submitting samples for analysis. The logic uses Windows Sysmon event codes to track relevant registry access patterns for these activities, capturing key changes that may indicate malicious intent. The rule employs specific Sysmon event codes to listen for registry modification attempts and aggregates the data for analysis. The presence of certain registry value changes, particularly those that turn off protective features or alter reporting capabilities, can indicate malicious behavior or attempts to impair defenses.
Categories
  • Windows
Data Sources
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1112
  • T1562.001
  • T1562
Created: 2024-02-09