Windows Defender Service Disabled - Registry
Detects when an attacker or tool disables the Windows Defender service (WinDefend) via the registry
Sigma rule (View on GitHub)
1title: Windows Defender Service Disabled - Registry
2id: e1aa95de-610a-427d-b9e7-9b46cfafbe6a
3status: test
4description: Detects when an attacker or tool disables the Windows Defender service (WinDefend) via the registry
5references:
6 - https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/
7 - https://gist.github.com/anadr/7465a9fde63d41341136949f14c21105
8author: Ján Trenčanský, frack113, AlertIQ, Nasreddine Bencherchali
9date: 2022-08-01
10modified: 2024-03-25
11tags:
12 - attack.defense-evasion
13 - attack.t1562.001
14logsource:
15 product: windows
16 category: registry_set
17detection:
18 selection:
19 TargetObject|endswith: '\Services\WinDefend\Start'
20 Details: 'DWORD (0x00000004)'
21 condition: selection
22falsepositives:
23 - Administrator actions
24level: high
References
Related rules
- Sysmon Driver Altitude Change
- Bitbucket Audit Log Configuration Updated
- Bitbucket Global SSH Settings Changed
- Bitbucket Global Secret Scanning Rule Deleted
- Bitbucket Project Secret Scanning Allowlist Added