Benchmark: T1562.001 Impair Defenses: Disable or Modify Tools
Overview
Adversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities. This may take many forms, such as killing security software processes or services, modifying / deleting Registry keys or configuration files so that tools do not operate properly, or other methods to interfere with security tools scanning or reporting information. Adversaries may also disable updates to prevent the latest security patches from reaching tools on victim systems.
Adversaries may also tamper with artifacts deployed and utilized by security tools. Security tools may make dynamic changes to system components in order to maintain visibility into specific events. For example, security products may load their own modules and/or modify those loaded by processes to facilitate data collection. Similar to Indicator Blocking, adversaries may unhook or otherwise modify these features added by tools (especially those that exist in userland or are otherwise potentially accessible to adversaries) to avoid detection.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/tailpipe-mod-azure-activity-log-detections
Start the Powerpipe server:
powerpipe server
Open http://localhost:9033 in your browser and select T1562.001 Impair Defenses: Disable or Modify Tools.
Run this benchmark in your terminal:
powerpipe benchmark run azure_activity_log_detections.benchmark.mitre_attack_v161_ta0005_t1562_001
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run azure_activity_log_detections.benchmark.mitre_attack_v161_ta0005_t1562_001 --share