heroui logo

Suspicious Windows Defender Folder Exclusion Added Via Reg.EXE

Sigma Rules

View Source
Summary
This rule detects the potentially malicious use of `reg.exe` to add folder exclusions to Windows Defender, a behavior associated with the Qbot malware. By using this technique, Qbot can prevent security software from scanning specific directories, enabling it to operate undetected. In particular, this rule focuses on command lines that involve paths for exclusions relating to the Microsoft Windows Defender and Microsoft Antimalware antivirus engines. The detection criteria specify that `reg.exe` must be invoked with specific arguments typically associated with adding exclusions, including patterns that lead to modifications in the registry keys for folder exclusions. The detection is relevant in contexts where threat actors need to evade detection to maintain persistence or steal sensitive information, especially when working within commonly targeted directories such as AppData and ProgramData. As a medium level alert, it underscores the need for further investigation but indicates that false positives may occur due to legitimate administrative actions regarding Windows Defender configurations.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
Created: 2022-02-13