heroui logo

Modification of AmsiEnable Registry Key

Elastic Detection Rules

View Source
Summary
The detection rule targets modifications to the `AmsiEnable` registry key on Windows systems, specifically when it is set to "0" or "0x00000000", which effectively disables the Antimalware Scan Interface (AMSI). This is a common tactic employed by adversaries to impair defenses, evading detection by disabling a key security feature used across various Windows components and security products. By monitoring changes to the registry key located at `HKEY_USERS\*\Software\Microsoft\Windows Script\Settings\AmsiEnable`, the rule enables security teams to identify potential malicious activity. To handle alerts generated by this rule, investigators should analyze user account actions, examine process execution chains, and investigate the presence of scripts or macros that might exploit this disabled AMSI protection. The rule comes with a detailed triage and analysis guide outlining investigation and response steps, emphasizing investigation depth and potential remediation actions to enhance security posture.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Logon Session
  • Windows Registry
  • Malware Repository
  • Application Log
ATT&CK Techniques
  • T1112
  • T1562
  • T1562.001
Created: 2021-06-01