Disabled AV On Dev Drive via Registry

Detects the execution registry change that enables a Dev Drive without allowing AV to access the created drive. This technique is available starting with Windows 11.

Sigma rule (View on GitHub)

 1title: Disabled AV On Dev Drive via Registry
 2id: 31e124fb-5dc4-42a0-83b3-44a69c77b271
 3description: Detects the execution registry change that enables a Dev Drive without allowing AV to access the created drive. This technique is available starting with Windows 11.
 4status: experimental
 5date: 2023/11/05
 6author: \@kostastsale
 7references:
 8    - https://twitter.com/0gtweet/status/1720419490519752955
 9logsource:
10    category: registry_set
11    product: windows
12detection:
13    selection1:
14        TargetObject|contains: 
15          - '\SYSTEM\CurrentControlSet\'
16        TargetObject|endswith:
17          - 'FltmgrDevDriveAllowAntivirusFilter'
18        Details|endswith: '0'
19    condition: selection1
20falsepositives:
21    - Unlikely
22level: high
23tags:
24    - attack.defense.evasion
25    - attack.T1562.001

References

Related rules

to-top