T1562.001 Impair Defenses Disable Defender Functionalities Via Registry Keys
T1562.001 ImpairDefenses - Disable Defender Functionalities Via Registry Keys¶
DESCRIPTION¶
Detects when attackers or tools disable Windows Defender functionalities via the Windows registry
example:
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
Related
Ransomware
Reference:
https://github.com/SigmaHQ/sigma/blob/8d28609c041867e1cea7821900e43c0106e6c766/rules/windows/registry/registry_set/registry_set_windows_defender_tamper.yml#L42
https://admx.help/?Category=Windows_7_2008R2&Policy=Microsoft.Policies.WindowsDefender::DisableAntiSpyware
ATT&CK TACTICS¶
T1562.001 - Impair Defenses: Disable or Modify Tools
Data Source(s): Windows Registry
SENTINEL RULE QUERY¶
Triage¶
- Remove the comment "//" in 'summarize' statement in above KQL to assist in analysis and removing data duplicates.
- Inspect the InitiatingProcessFolderPath, InitiatingProcessFileName, and InitiatingProcessCommandLine, and see any suspicious process adding defender exclusion
- Check why Defender was disabled.
FalsePositive¶
- Legitimate application adding folder exceptions to the registry key
- Group policy being used to disabling defender (added to exclusion-out of scope of this detection)
VERSION¶
Version 2.0 (date: 07/02/2024)