Windows Hypervisor Enforced Code Integrity Disabled
Detects changes to the HypervisorEnforcedCodeIntegrity registry key and the "Enabled" value being set to 0 in order to disable the Hypervisor Enforced Code Integrity feature. This allows an attacker to load unsigned and untrusted code to be run in the kernel
Sigma rule (View on GitHub)
1title: Windows Hypervisor Enforced Code Integrity Disabled
2id: 8b7273a4-ba5d-4d8a-b04f-11f2900d043a
3related:
4 - id: 6225c53a-a96e-4235-b28f-8d7997cd96eb
5 type: similar
6status: test
7description: |
8 Detects changes to the HypervisorEnforcedCodeIntegrity registry key and the "Enabled" value being set to 0 in order to disable the Hypervisor Enforced Code Integrity feature. This allows an attacker to load unsigned and untrusted code to be run in the kernel
9references:
10 - https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/
11 - https://github.com/redcanaryco/atomic-red-team/blob/04e487c1828d76df3e834621f4f893ea756d5232/atomics/T1562.001/T1562.001.md#atomic-test-43---disable-hypervisor-enforced-code-integrity-hvci
12author: Nasreddine Bencherchali (Nextron Systems), Anish Bogati
13date: 2023-03-14
14modified: 2024-07-05
15tags:
16 - attack.defense-evasion
17 - attack.t1562.001
18logsource:
19 category: registry_set
20 product: windows
21detection:
22 selection:
23 TargetObject|endswith:
24 - '\Control\DeviceGuard\HypervisorEnforcedCodeIntegrity'
25 - '\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity\Enabled'
26 - '\Microsoft\Windows\DeviceGuard\HypervisorEnforcedCodeIntegrity'
27 Details: 'DWORD (0x00000000)'
28 condition: selection
29falsepositives:
30 - Legitimate system administration tasks that require disabling HVCI for troubleshooting purposes when certain drivers or applications are incompatible with it.
31level: high
32regression_tests_path: regression_data/rules/windows/registry/registry_set/registry_set_deviceguard_hypervisorenforcedcodeintegrity_disabled/info.yml
33simulation:
34 - type: atomic-red-team
35 name: Disable Hypervisor-Enforced Code Integrity (HVCI)
36 technique: T1562.001
37 atomic_guid: 70bd71e6-eba4-4e00-92f7-617911dbe020
References
Related rules
- Hypervisor-protected Code Integrity (HVCI) Related Registry Tampering Via CommandLine
- Vulnerable Driver Blocklist Registry Tampering Via CommandLine
- Windows Vulnerable Driver Blocklist Disabled
- Devcon Execution Disabling VMware VMCI Device
- Microsoft Malware Protection Engine Crash