Hypervisor Enforced Code Integrity Disabled

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects changes to the HypervisorEnforcedCodeIntegrity registry key and the "Enabled" value being set to 0 in order to disable the Hypervisor Enforced Code Integrity feature. This allows an attacker to load unsigned and untrusted code to be run in the kernel

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Registry value modified" AND (OBJECTNAME endswith "\Microsoft\Windows\DeviceGuard\HypervisorEnforcedCodeIntegrity,\Control\DeviceGuard\HypervisorEnforcedCodeIntegrity,\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity\Enabled" OR (OBJECTNAME endswith "\Microsoft\Windows\DeviceGuard,\Control\DeviceGuard,\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity" AND OBJECTVALUENAME = "HypervisorEnforcedCodeIntegrity,HypervisorEnforcedCodeIntegrity,Enabled")) AND (INFORMATION = "DWORD (0x00000000)" OR (CHANGES = 0 AND NEWTYPE = "REG_DWORD")) select Action1.HOSTNAME,Action1.MESSAGE,Action1.OBJECTNAME,Action1.PROCESSNAME,Action1.PREVVAL,Action1.CHANGES

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Nasreddine Bencherchali (Nextron Systems), Anish Bogati