
Summary
This detection rule identifies excessive file deletion events within the Windows Defender folder, an essential security component in Windows operating systems. It utilizes Sysmon's Event Codes 23 (File Delete) and 26 (File Modified) to track processes that execute numerous deletions in this directory. The rule operates under the hypothesis that such behavior might indicate an attempt to disrupt or neutralize Windows Defender, thereby potentially allowing further nefarious activities without adequate detection. If an entity is observed deleting 50 or more files within this folder, it triggers an alert for investigation, as this could be indicative of malicious intentions such as exploiting ransomware or destructive malware tactics. Understanding the context and the user initiating the file deletions is crucial for determining the legitimacy of such actions, where legitimate processes might also account for high deletion counts due to routine operational activity such as antivirus updates.
Categories
- Endpoint
Data Sources
- Windows Registry
- File
ATT&CK Techniques
- T1485
Created: 2024-11-13