Microsoft Defender Tampering via Registry Modification
Adversaries may disable or tamper with Microsoft Defender features via registry modifications to evade detection and conceal malicious behavior on Windows systems.
Attackers commonly disable or tamper with Microsoft Defender features to evade detection and conceal malicious behavior within compromised Windows environments. This is often achieved by modifying specific registry keys that control the behavior and functionality of Defender components, such as real-time monitoring, exploit protection, and tamper protection itself. Such actions can significantly reduce the effectiveness of endpoint security, allowing malicious activities to proceed undetected. The references point to techniques that disable PUA protection, tamper protection, memory integrity, and real-time protection. This behavior is observed across various attack scenarios, including ransomware deployment and cryptocurrency mining campaigns.
Attack Chain
- Initial access is gained through an unspecified vector (e.g., phishing, exploitation of a vulnerability).
- The attacker obtains elevated privileges on the system.
- The attacker uses an administrative tool like
reg.exeor PowerShell to modify the registry. - The attacker disables real-time monitoring by setting
HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoringto 1. - The attacker disables tamper protection by setting
HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Features\TamperProtectionto 0. - The attacker disables PUA Protection by setting
HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\PUAProtectionto 0. - With Defender weakened, the attacker executes malicious payloads, such as ransomware or cryptocurrency miners.
Impact
Successful tampering with Microsoft Defender can lead to a significant degradation of endpoint security posture. This can result in undetected malware infections, data breaches, and system compromise. Disabling Defender features can allow attackers to establish persistence, escalate privileges, and deploy malicious payloads without triggering alerts. The impact can range from individual system compromise to widespread network infection, depending on the attacker’s objectives and the extent of the tampering.
Recommendation
- Deploy the Sigma rule “Microsoft Windows Defender Tampering - Disable Realtime Monitoring” to your SIEM to detect modifications to the
DisableRealtimeMonitoringregistry value. - Deploy the Sigma rule “Microsoft Windows Defender Tampering - Disable Tamper Protection” to detect modifications to the
TamperProtectionregistry value. - Monitor registry modification events, specifically targeting keys associated with Microsoft Defender settings as described in the rule query.
- Investigate any process modifying Windows Defender registry settings that are not explicitly authorized, referencing the process exclusions in the rule query.
Detection coverage 2
Microsoft Windows Defender Tampering - Disable Realtime Monitoring
mediumDetects attempts to disable Microsoft Defender Realtime Monitoring via registry modification.
Microsoft Windows Defender Tampering - Disable Tamper Protection
mediumDetects attempts to disable Microsoft Defender Tamper Protection via registry modification.
Detection queries are kept inside the platform. Get full rules →