mirror of https://gitlab.com/curben/blog
page(threat-hunting): Disable Microsoft Defender (Registry)
This commit is contained in:
parent
16e9e6ac56
commit
d824585ced
|
|
@ -2,7 +2,7 @@
|
||||||
title: Splunk Threat Hunting
|
title: Splunk Threat Hunting
|
||||||
layout: page
|
layout: page
|
||||||
date: 2025-01-15
|
date: 2025-01-15
|
||||||
updated: 2025-05-04
|
updated: 2025-05-20
|
||||||
---
|
---
|
||||||
|
|
||||||
Some searches utilise [cmdb_ci_list_lookup](https://gitlab.com/curben/splunk-scripts/-/tree/main/Splunk_TA_snow) lookup.
|
Some searches utilise [cmdb_ci_list_lookup](https://gitlab.com/curben/splunk-scripts/-/tree/main/Splunk_TA_snow) lookup.
|
||||||
|
|
@ -609,6 +609,16 @@ index="windows" source IN ("XmlWinEventLog:Microsoft-Windows-PowerShell/Operatio
|
||||||
| table Time, host, Path, Username, Name, ScriptBlockText, System_Props_Xml
|
| table Time, host, Path, Username, Name, ScriptBlockText, System_Props_Xml
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Disable Microsoft Defender (Registry)
|
||||||
|
|
||||||
|
References: [1](https://thedfirreport.com/2025/05/19/another-confluence-bites-the-dust-falling-to-elpaco-team-ransomware/#defense-evasion), [2](https://learn.microsoft.com/en-us/windows-hardware/customize/desktop/unattend/security-malware-windows-defender-disableantispyware)
|
||||||
|
SPL:
|
||||||
|
|
||||||
|
```spl
|
||||||
|
| tstats summariesonly=true allow_old_summaries=true fillnull_value="unknown" count FROM datamodel=Endpoint.Registry WHERE index="windows" Registry.registry_path="*\\Microsoft\\Windows Defender*" Registry.registry_value_name IN ("DisableAntiSpyware", "DisableAntivirus") Registry.registry_value_data="1" BY Registry.dest, Registry.action, Registry.process_guid, Registry.process_id, Registry.registry_path, Registry.registry_value_name, Registry.registry_value_data, Registry.user
|
||||||
|
| rename Registry.* AS *
|
||||||
|
```
|
||||||
|
|
||||||
## EvilProxy IoC
|
## EvilProxy IoC
|
||||||
|
|
||||||
Description: A user has possibly visited a phishing site operated behind EvilProxy that reverse proxy to Microsoft sites.
|
Description: A user has possibly visited a phishing site operated behind EvilProxy that reverse proxy to Microsoft sites.
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue