
Summary
This detection rule aims to identify unauthorized modifications to the Windows registry, specifically targeting the setting that disables the raw write notification feature of Windows Defender. The Windows registry position monitored by this analytic is integral to the real-time protection features of Defender, as disabling this notification could enable malware like Azorult to evade detection during its operations. The detection mechanism relies on the monitoring capabilities offered by Sysmon, particularly using EventID 12 and EventID 13 to track registry changes. This rule is particularly significant given the high risks associated with malware exploitation when such protections are circumvented.
Categories
- Endpoint
Data Sources
- Windows Registry
- Image
ATT&CK Techniques
- T1112
Created: 2024-11-13