
Summary
This detection rule is designed to identify potentially malicious use of the 'reg.exe' tool to disable critical Windows security services, such as Windows Defender. Security services play a vital role in protecting the system from unauthorized access and malware. The rule focuses on monitoring process creation events that contain command-line arguments indicative of registry modifications that disable these services. Specifically, it looks for instances where the 'reg add' command is used with parameters that target essential Windows services linked to security. The conditions set within the detection logic require that both the command prefix and specific service targets are present, ensuring that only potentially harmful actions are flagged. False positives are deemed unlikely, thus providing a reliable method to detect attempts to disable security mechanisms in an operational environment.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
Created: 2021-07-14