Windows System Restore Disabled via Registry Modification
Attackers disable Windows System Restore by modifying specific registry keys to hinder recovery efforts after malicious activity.
Attackers may disable the Windows System Restore feature to prevent victims from easily reverting their systems to a clean state after an infection or other malicious activity. This action complicates incident response and remediation efforts, forcing more complex and time-consuming recovery procedures. Disabling system restore is often performed post-compromise to ensure persistence and hinder forensic analysis. This technique can be implemented manually through the registry editor or via automated scripts, making it accessible to a wide range of threat actors.
Attack Chain
- Initial access is gained through various methods (e.g., phishing, exploitation).
- The attacker escalates privileges to Administrator or SYSTEM.
- The attacker uses
reg.exeor PowerShell to modify registry keys. - The attacker targets the
HKLM\Software\Policies\Microsoft\Windows NT\SystemRestore\DisableConfigregistry key. - Alternatively, the attacker targets the
HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore\DisableSRregistry key. - The attacker sets the value of the targeted registry key to
DWORD:00000001. - The attacker confirms the System Restore feature is disabled.
- The attacker proceeds with further malicious activities, knowing that recovery is hindered.
Impact
Disabling System Restore can significantly impede recovery efforts following a cyber incident. Organizations may face longer downtimes and increased costs associated with manual system reimaging or advanced forensic analysis. The absence of readily available restore points can also lead to data loss if systems are severely damaged or encrypted.
Recommendation
- Deploy the Sigma rule
Registry Disable System Restoreto your SIEM to detect malicious attempts to disable System Restore via registry modification. - Monitor registry modifications related to System Restore configurations, focusing on the keys
\Policies\Microsoft\Windows NT\SystemRestoreand\Microsoft\Windows NT\CurrentVersion\SystemRestore, and values set toDWORD (0x00000001). - Implement strict access controls to prevent unauthorized modification of registry settings.
Detection coverage 2
Registry Disable System Restore Modified
highDetects modification of the registry to disable system restore
Registry Disable System Restore via reg.exe
highDetects disabling system restore via reg.exe command
Detection queries are kept inside the platform. Get full rules →