Skip to content

Latest commit

 

History

History
38 lines (21 loc) · 1.05 KB

T1562.001-Impair-Defenses-AMSIBypass.md

File metadata and controls

38 lines (21 loc) · 1.05 KB

T1562.001 - Impair Defenses: Disable or Modify Tools - AMSI Bypass attack

DESCRIPTION

This query detects attempts to disable AMSI (Antimalware Scripting Interface) in the command line. It is possible to bypass AMSI by disabling it before loading the main payload.

Example:

[Ref].Assembly.GetType(‘System.Management.Automation.Am’+’siUtils’).GetField(‘amsiInitFailed’,’NonPublic,Static’).SetValue($null,$true)

Related

NA

Reference:

https://github.com/SigmaHQ/sigma/blob/8d28609c041867e1cea7821900e43c0106e6c766/deprecated/windows/proc_creation_win_powershell_amsi_bypass_pattern_nov22.yml

ATT&CK TACTICS

{{ mitre("T1562.001")}}

Data Source(s): Command

SENTINEL RULE QUERY

let c1 = dynamic(['Assembly.GetType','SetValue']);  
find where InitiatingProcessCommandLine has_all (c1) or CommandLine has_all (c1)  

Triage

  1. Inspect if the activity if it is expected and approved performed by an admin or a service

VERSION

Version 1.0 (date: 10/07/2023)