heroui logo

Windows Defender Disabled Detection

Anvilogic Forge

View Source
Summary
The Windows Defender Disabled Detection rule identifies events where an attacker may have disabled security tools, specifically focusing on Windows Defender components. This detection is crucial as attackers often disable security mechanisms to avoid detection of their activities and tools. The rule utilizes data from Windows Sysmon to analyze Event Code 13, which indicates the stopping of a service. It correlates this with specific signatures that denote either the Windows Defender service ('WdNisDrv') or instances where the firewall policy is set to a default state ('0x00000000'). The logic is built to aggregate and present the data effectively, allowing security teams to scrutinize events over 60-second intervals. The rule also highlights historical trends, linking it to various threat actor groups and their associated malware families, underlining the importance of monitoring these events in the context of ongoing cyber threats.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1588.002
  • T1562.001
Created: 2024-02-09