
Summary
This detection rule identifies potential tampering with Windows Defender registry keys using the 'reg.exe' command-line tool. By monitoring process creation activities related to 'reg.exe', the rule aims to detect attempts to modify crucial registry settings that are integral for Windows Defender's protective features. Specific registry paths related to Microsoft Windows Defender are monitored, and the rule focuses on command line arguments that suggest an attempt to disable or alter key security settings, such as disabling real-time monitoring, turning off behavioral monitoring, or disabling anti-virus capabilities. The detection logic combines checks for the 'reg.exe' image running and command line parameters indicating potential malicious intent to disable protective features. Given the high stakes involved, as tampering with security settings can open systems to threats, such activities should always be closely examined.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
Created: 2022-03-22