heroui logo

Windows Impair Defense Deny Security Software With Applocker

Splunk Security Content

View Source
Summary
This detection rule monitors modifications in the Windows registry made by the Applocker utility that deny execution for various security software. Specifically, it targets specific registry paths and values that indicate a "Deny" action against known antivirus solutions. The underlying concern is that such modifications could signify an attempt by malicious actors to disable security mechanisms, as seen with malware behaviors like those of Azorult. By denying the execution of essential security software, attackers could potentially bypass defenses, leading to heightened risks and enabling further malware operations within the affected Windows environment.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • User Account
ATT&CK Techniques
  • T1562.001
  • T1562
Created: 2024-11-13