
Summary
The 'Raccine Uninstall' detection rule identifies attempts to uninstall Raccine, a free ransomware protection tool designed to help mitigate the risk of ransomware attacks on Windows systems. It monitors process creation events that exhibit specific command-line patterns indicative of Raccine being removed. This includes commands aimed at terminating Raccine processes, deleting Raccine settings from the Windows registry, and removing scheduled tasks associated with Raccine functionality. The rule is crucial for maintaining ransomware defense integrity, especially in environments that depend on Raccine for protection. The detection criteria leverage command-line monitoring to capture various methods that could be used to undermine or disable Raccine's operational effectiveness. By focusing on commands like 'taskkill', 'reg.exe', and 'schtasks', the rule aims to flag potentially malicious activities that might suggest an attacker's attempts to disable or uninstall protective measures.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2021-01-21