heroui logo

Windows Defender AMSI Trigger Detected

Sigma Rules

View Source
Summary
This rule is designed to detect events where the Antimalware Scan Interface (AMSI) is triggered by Windows Defender. The detection focuses on the Event ID 1116, which indicates a malware detection alert from the AMSI component. The rule is relevant in contexts where malicious scripts or applications may attempt to execute while being monitored by Windows Defender's AMSI framework. This aims to enhance the security of Windows systems by providing visibility into potentially harmful execution processes. The rule is classified as 'high' severity due to the implications of a successful malware execution and extraction. It is particularly pertinent for security analysts and incident response teams monitoring Windows-based environments, as it helps identify proactive prevention measures being taken by the Defender against emerging threats. This detection rule could help organizations strengthen their response protocols to tackle malware infestations effectively, following the best practices tailored for the Windows operating system.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Logon Session
  • Process
  • Application Log
Created: 2020-09-14