Skip to content
Threat Feed
medium advisory

Microsoft Defender Tampering via Registry Modification

Adversaries may disable or tamper with Microsoft Defender features via registry modifications to evade detection and conceal malicious behavior on Windows systems.

Attackers commonly disable or tamper with Microsoft Defender features to evade detection and conceal malicious behavior within compromised Windows environments. This is often achieved by modifying specific registry keys that control the behavior and functionality of Defender components, such as real-time monitoring, exploit protection, and tamper protection itself. Such actions can significantly reduce the effectiveness of endpoint security, allowing malicious activities to proceed undetected. The references point to techniques that disable PUA protection, tamper protection, memory integrity, and real-time protection. This behavior is observed across various attack scenarios, including ransomware deployment and cryptocurrency mining campaigns.

Attack Chain

  1. Initial access is gained through an unspecified vector (e.g., phishing, exploitation of a vulnerability).
  2. The attacker obtains elevated privileges on the system.
  3. The attacker uses an administrative tool like reg.exe or PowerShell to modify the registry.
  4. The attacker disables real-time monitoring by setting HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring to 1.
  5. The attacker disables tamper protection by setting HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Features\TamperProtection to 0.
  6. The attacker disables PUA Protection by setting HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\PUAProtection to 0.
  7. With Defender weakened, the attacker executes malicious payloads, such as ransomware or cryptocurrency miners.

Impact

Successful tampering with Microsoft Defender can lead to a significant degradation of endpoint security posture. This can result in undetected malware infections, data breaches, and system compromise. Disabling Defender features can allow attackers to establish persistence, escalate privileges, and deploy malicious payloads without triggering alerts. The impact can range from individual system compromise to widespread network infection, depending on the attacker’s objectives and the extent of the tampering.

Recommendation

  • Deploy the Sigma rule “Microsoft Windows Defender Tampering - Disable Realtime Monitoring” to your SIEM to detect modifications to the DisableRealtimeMonitoring registry value.
  • Deploy the Sigma rule “Microsoft Windows Defender Tampering - Disable Tamper Protection” to detect modifications to the TamperProtection registry value.
  • Monitor registry modification events, specifically targeting keys associated with Microsoft Defender settings as described in the rule query.
  • Investigate any process modifying Windows Defender registry settings that are not explicitly authorized, referencing the process exclusions in the rule query.

Detection coverage 2

Microsoft Windows Defender Tampering - Disable Realtime Monitoring

medium

Detects attempts to disable Microsoft Defender Realtime Monitoring via registry modification.

sigma tactics: defense_evasion techniques: T1112, T1562, T1562.001 sources: registry_set, windows

Microsoft Windows Defender Tampering - Disable Tamper Protection

medium

Detects attempts to disable Microsoft Defender Tamper Protection via registry modification.

sigma tactics: defense_evasion techniques: T1112, T1562, T1562.001 sources: registry_set, windows

Detection queries are kept inside the platform. Get full rules →