Skip to content

Commit 7ff17f0

Browse files
committed
Create security_solution_tampering.yml
1 parent e9540be commit 7ff17f0

File tree

1 file changed

+25
-0
lines changed

1 file changed

+25
-0
lines changed
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
name: Security Solution Tampering
2+
id: c17cde5f-9f00-472b-9d4e-fceb2f47d656
3+
version: 1
4+
date: '2025-01-21'
5+
author: Nasreddine Bencherchali, Splunk
6+
description: |
7+
This analytic story focuses on identifying behaviors associated with the misuse of security solution utilities, such as antivirus (AV) and endpoint detection and response (EDR) tools, on endpoints. Adversaries often exploit these utilities to disable critical security services, modify configurations, or execute defense evasion actions. Such activities are typically aimed at bypassing detection mechanisms, disrupting incident response efforts, and maintaining persistence within a compromised environment. By monitoring for these suspicious behaviors, this story empowers security teams to detect, investigate, and respond to potential tampering or manipulation of endpoint defenses effectively.
8+
narrative: |
9+
Attackers often target security solutions as part of their defense evasion strategies. By disabling or tampering with AV and EDR services, they can reduce the likelihood of detection and freely execute malicious activities. This analytic story focuses on detecting such malicious interactions with security utilities, helping organizations to identify and respond to potential threats promptly.
10+
11+
The detections within this story leverage various data sources to monitor for suspicious activities, such as the execution of known security utility binaries with parameters that disable protections, unexpected stopping of security services, or modification of security-related registry keys. Implementing these detections enables security teams to enhance their visibility into potential tampering attempts and strengthen their overall security posture.
12+
references:
13+
- https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/213690-amp-for-endpoint-command-line-switches.html
14+
- https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/appendices/windows-commands-for-the-endpoint-protection-clien-v9567615-d19e6200.html
15+
- https://learn.microsoft.com/en-us/powershell/module/defender/set-mppreference?view=windowsserver2025-ps
16+
- https://support.kaspersky.com/keswin/11.1.1/en-US/178723.htm
17+
- https://ppn.snovvcrash.rocks/pentest/infrastructure/ad/av-edr-evasion/defender
18+
tags:
19+
category:
20+
- Defense Evasion
21+
product:
22+
- Splunk Enterprise
23+
- Splunk Enterprise Security
24+
- Splunk Cloud
25+
usecase: Threat Detection

0 commit comments

Comments
 (0)