Skip to content

Commit bd0f9a0

Browse files
committed
feat(rules): Suspicious Windows Defender exclusions registry modification
Identifies the modification of the Windows Defender process, path, or IP address registry key exclusions by suspicious processes. Adversaries may alter the Windows Defender exclusions to bypass defenses.
1 parent 7df0828 commit bd0f9a0

File tree

1 file changed

+48
-0
lines changed

1 file changed

+48
-0
lines changed
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
name: Suspicious Windows Defender exclusions registry modification
2+
id: 92fdbbea-e177-494e-8a6a-d8b055daf0e9
3+
version: 1.0.0
4+
description: |
5+
Identifies the modification of the Windows Defender process, path, or IP address registry key exclusions
6+
by suspicious processes. Adversaries may alter the Windows Defender exclusions to bypass defenses.
7+
labels:
8+
tactic.id: TA0005
9+
tactic.name: Defense Evasion
10+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
11+
technique.id: T1562
12+
technique.name: Impair Defenses
13+
technique.ref: https://attack.mitre.org/techniques/T1562/
14+
subtechnique.id: T1562.001
15+
subtechnique.name: Disable or Modify Tools
16+
subtechnique.ref: https://attack.mitre.org/techniques/T1562/001
17+
18+
condition: >
19+
set_value and registry.path imatches 'HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows Defender\\Exclusions\\*'
20+
and
21+
(
22+
ps.exe imatches
23+
(
24+
'?:\\Users\\*\\AppData\\*',
25+
'?:\\Users\\Public\\*',
26+
'?:\\Windows\\Microsoft.NET\\*',
27+
'?:\\ProgramData\\*'
28+
)
29+
or
30+
ps.name iin ('pwsh.exe', 'rundll32.exe', 'regsvr32.exe', 'cscript.exe', 'reg.exe', 'wscript.exe', 'mshta.exe', 'msbuild.exe', 'powershell.exe', 'cmd.exe')
31+
or
32+
pe.is_signed = false or pe.is_trusted = false
33+
)
34+
and
35+
ps.exe not imatches
36+
(
37+
'?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\ConfigSecurityPolicy.exe',
38+
'?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\MsMpEng.exe',
39+
'?:\\ProgramData\\Microsoft\\Windows Defender\\*\\NisSrv.exe'
40+
)
41+
action:
42+
- name: kill
43+
44+
output: >
45+
Windows Defender exclusion %registry.path added by suspicious process %ps.exe
46+
severity: high
47+
48+
min-engine-version: 2.4.0

0 commit comments

Comments
 (0)