turbot/tailpipe-mod-azure-activity-log-detections

Benchmark: T1562.001 Impair Defenses: Disable or Modify Tools

Overview

Adversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities. This may take many forms, such as killing security software processes or services, modifying / deleting Registry keys or configuration files so that tools do not operate properly, or other methods to interfere with security tools scanning or reporting information. Adversaries may also disable updates to prevent the latest security patches from reaching tools on victim systems.

Adversaries may also tamper with artifacts deployed and utilized by security tools. Security tools may make dynamic changes to system components in order to maintain visibility into specific events. For example, security products may load their own modules and/or modify those loaded by processes to facilitate data collection. Similar to Indicator Blocking, adversaries may unhook or otherwise modify these features added by tools (especially those that exist in userland or are otherwise potentially accessible to adversaries) to avoid detection.

Usage

Install the mod:

mkdir dashboards
cd dashboards
powerpipe mod init
powerpipe mod install github.com/turbot/tailpipe-mod-azure-activity-log-detections

Start the Powerpipe server:

powerpipe server

Open http://localhost:9033 in your browser and select T1562.001 Impair Defenses: Disable or Modify Tools.

Run this benchmark in your terminal:

powerpipe benchmark run azure_activity_log_detections.benchmark.mitre_attack_v161_ta0005_t1562_001

Snapshot and share results via Turbot Pipes:

powerpipe benchmark run azure_activity_log_detections.benchmark.mitre_attack_v161_ta0005_t1562_001 --share

Detections