
Summary
The detection rule 'Windows DISM Remove Defender' is designed to identify instances where the DISM (Deployment Image Servicing and Management) tool is used to disable or remove Windows Defender, which is a critical security feature of the Windows operating system. This rule primarily relies on telemetry data gathered from Endpoint Detection and Response (EDR) agents, specifically looking for command-line executions of 'dism.exe' that include parameters associated with disabling features and removing Windows Defender. Such actions are indicative of possible malicious intent, as adversaries might disable this security measure to evade detection and conduct further malicious operations without being hindered by Windows Defender's protective capabilities. If this behavior is confirmed as malicious, it could potentially allow attackers to gain persistent access, deploy additional payloads, or exfiltrate sensitive information without facing interception. The rule utilizes various data sources, including Sysmon and Windows event logs, to carry out its detection.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Application Log
- Process
ATT&CK Techniques
- T1562.001
- T1562
Created: 2024-12-10