LoFP LoFP / administrator actions via the windows defender interface

Techniques

Sample rules

Disable Windows Defender Functionalities Via Registry Keys

Description

Detects when attackers or tools disable Windows Defender functionalities via the Windows registry

Detection logic

condition: selection_main and 1 of selection_dword_*
selection_dword_0:
  Details: DWORD (0x00000000)
  TargetObject|endswith:
  - \App and Browser protection\DisallowExploitProtectionOverride
  - \Features\TamperProtection
  - \MpEngine\MpEnablePus
  - \PUAProtection
  - \Signature Update\ForceUpdateFromMU
  - \SpyNet\SpynetReporting
  - \SpyNet\SubmitSamplesConsent
  - \Windows Defender Exploit Guard\Controlled Folder Access\EnableControlledFolderAccess
selection_dword_1:
  Details: DWORD (0x00000001)
  TargetObject|endswith:
  - \DisableAntiSpyware
  - \DisableAntiVirus
  - \Real-Time Protection\DisableBehaviorMonitoring
  - \Real-Time Protection\DisableIntrusionPreventionSystem
  - \Real-Time Protection\DisableIOAVProtection
  - \Real-Time Protection\DisableOnAccessProtection
  - \Real-Time Protection\DisableRealtimeMonitoring
  - \Real-Time Protection\DisableScanOnRealtimeEnable
  - \Real-Time Protection\DisableScriptScanning
  - \Reporting\DisableEnhancedNotifications
  - \SpyNet\DisableBlockAtFirstSeen
selection_main:
  TargetObject|contains:
  - \SOFTWARE\Microsoft\Windows Defender\
  - \SOFTWARE\Policies\Microsoft\Windows Defender Security Center\
  - \SOFTWARE\Policies\Microsoft\Windows Defender\