Detection rules › Sigma
Suspicious Windows Defender Registry Key Tampering Via Reg.EXE
Detects the usage of "reg.exe" to tamper with different Windows Defender registry keys in order to disable some important features related to protection and detection
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Defense Evasion | T1562.001 Impair Defenses: Disable or Modify Tools |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 1 | Process creation |
Stages and Predicates
Stage 1: all of selection_root_img
or:
Image|endswith: '\reg.exe'
OriginalFileName: reg.exe
Stage 2: all of selection_root_path
or:
CommandLine|contains: 'SOFTWARE\Microsoft\Windows Defender\'
CommandLine|contains: 'SOFTWARE\Policies\Microsoft\Windows Defender Security Center'
CommandLine|contains: 'SOFTWARE\Policies\Microsoft\Windows Defender\'
Stage 3: 1 of selection_dword_0
or:
CommandLine|contains: 'DisallowExploitProtectionOverride'
CommandLine|contains: EnableControlledFolderAccess
CommandLine|contains: MpEnablePus
CommandLine|contains: PUAProtection
CommandLine|contains: SpynetReporting
CommandLine|contains: SubmitSamplesConsent
CommandLine|contains: TamperProtection
CommandLine|contains: ' add '
CommandLine|contains: 'd 0'
Stage 4: 1 of selection_dword_1
or:
CommandLine|contains: DisableAccess
CommandLine|contains: DisableAntiSpyware
CommandLine|contains: 'DisableAntiSpywareRealtimeProtection'
CommandLine|contains: DisableAntiVirus
CommandLine|contains: DisableAntiVirusSignatures
CommandLine|contains: DisableArchiveScanning
CommandLine|contains: DisableBehaviorMonitoring
CommandLine|contains: DisableBlockAtFirstSeen
CommandLine|contains: DisableCloudProtection
CommandLine|contains: DisableConfig
CommandLine|contains: DisableEnhancedNotifications
CommandLine|contains: DisableIOAVProtection
CommandLine|contains: DisableIntrusionPreventionSystem
CommandLine|contains: DisableNetworkProtection
CommandLine|contains: DisableOnAccessProtection
CommandLine|contains: DisablePrivacyMode
CommandLine|contains: DisableRealtimeMonitoring
CommandLine|contains: DisableRoutinelyTakingAction
CommandLine|contains: DisableScanOnRealtimeEnable
CommandLine|contains: DisableScriptScanning
CommandLine|contains: DisableSecurityCenter
CommandLine|contains: Notification_Suppress
CommandLine|contains: 'SignatureDisableUpdateOnStartupWithoutEngine'
CommandLine|contains: ' add '
CommandLine|contains: 'd 1'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
CommandLine | match |
|
Image | ends_with |
|
OriginalFileName | eq |
|