-
-
Notifications
You must be signed in to change notification settings - Fork 2.5k
new: AMSI Disabled via Registry Modification #5813
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
7510516 to
a8d9b01
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull request overview
This PR adds two new Sigma detection rules for identifying attempts to disable Windows AMSI (Anti-Malware Scan Interface) through different methods. The rules target adversaries trying to evade detection by disabling AMSI, a security feature that allows applications to integrate with anti-malware products.
- Adds a registry modification detection rule for AMSI disable attempts
- Adds a process creation detection rule for AMSI disable command execution
- Includes comprehensive regression test data for both detection rules
Reviewed changes
Copilot reviewed 6 out of 8 changed files in this pull request and generated 1 comment.
Show a summary per file
| File | Description |
|---|---|
| rules/windows/registry/registry_set/registry_set_amsi_disable.yml | New rule detecting AMSI disable via registry modification of AmsiEnable value |
| rules/windows/process_creation/proc_creation_win_amsi_disable.yml | New rule detecting AMSI disable via command-line execution (reg.exe or PowerShell) |
| regression_data/rules/windows/registry/registry_set/registry_set_amsi_disable/info.yml | Test metadata for registry modification detection rule |
| regression_data/rules/windows/registry/registry_set/registry_set_amsi_disable/aa37cbb0-da36-42cb-a90f-fdf216fc7467.json | Sample event data for registry modification test |
| regression_data/rules/windows/process_creation/proc_creation_win_amsi_disable/info.yml | Test metadata for process creation detection rule |
| regression_data/rules/windows/process_creation/proc_creation_win_amsi_disable/7dbbcac2-57a0-45ac-b306-ff30a8bd2981.json | Sample event data for process creation test |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
rules/windows/registry/registry_set/registry_set_amsi_disable.yml
Outdated
Show resolved
Hide resolved
Co-authored-by: Copilot <[email protected]>
rules/windows/process_creation/proc_creation_win_amsi_disable.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_amsi_registry_tampering.yml
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_amsi_disable.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_amsi_registry_tampering.yml
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_amsi_registry_tampering.yml
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_amsi_disable.yml
Outdated
Show resolved
Hide resolved
apply suggestions Co-authored-by: Nasreddine Bencherchali <[email protected]>
Summary of the Pull Request
Changelog
new: Windows AMSI Related Registry Tampering Via CommandLine
new: AMSI Disabled via Registry Modification
Example Log Event
Fixed Issues
SigmaHQ Rule Creation Conventions