Windows Defender Tracing Level Modification
The following analytic detects modifications to the Windows registry specifically targeting the 'WppTracingLevel' setting within Windows Defender, potentially impairing its diagnostic capabilities and allowing attackers to evade detection.
Attackers may attempt to disable or modify Windows Defender’s tracing level to evade detection. The “WppTracingLevel” setting within the Windows Defender registry can be modified to impair its diagnostic capabilities, effectively hiding malicious activities. This allows attackers to operate with reduced scrutiny and maintain persistence within the environment. Defenders should monitor for unauthorized changes to this registry key to detect potential attempts to impair Windows Defender’s functionality. The technique is described in a Twitter post from December 2023.
Attack Chain
- An attacker gains initial access to the system, potentially through phishing or exploiting a vulnerability.
- The attacker escalates privileges to obtain the necessary permissions to modify the registry.
- The attacker uses a tool like
reg.exeor PowerShell to modify theWppTracingLevelregistry value. - The attacker sets the
WppTracingLevelvalue to0x00000001, effectively reducing the tracing level. - Windows Defender’s diagnostic capabilities are impaired due to the reduced tracing level.
- The attacker performs malicious activities, such as deploying malware or exfiltrating data, with a reduced risk of detection.
- The attacker attempts to maintain persistence by establishing footholds in the system.
Impact
Successful modification of the Windows Defender tracing level can significantly impair the system’s ability to detect and respond to threats. This can lead to a successful breach, data exfiltration, and long-term persistence of the attacker within the environment. While the exact number of victims is unknown, the potential impact is high due to the widespread use of Windows Defender.
Recommendation
- Enable Sysmon Event ID 13 logging to monitor registry modifications and activate the rules below.
- Deploy the Sigma rules in this brief to your SIEM and tune for your environment to detect changes to the
WppTracingLevelregistry setting. - Investigate any detected modifications to the
WppTracingLevelregistry key.
Detection coverage 2
Detect Windows Defender WppTracingLevel Registry Modification via Sysmon
mediumDetects modifications to the Windows Defender WppTracingLevel registry key.
Detect Windows Defender WppTracingLevel Modification via PowerShell
mediumDetects modifications to the Windows Defender WppTracingLevel registry key using PowerShell.
Detection queries are kept inside the platform. Get full rules →