Windows Defender Disabled via Registry Modification
An attacker modifies the Windows Registry key 'DisableAntiSpyware' to disable Windows Defender, a technique commonly associated with Ryuk ransomware to evade defenses.
This threat brief addresses the disabling of Windows Defender by modifying the DisableAntiSpyware registry key. This is a common tactic used by ransomware actors, including Ryuk, to disable endpoint protection and facilitate malicious activities. The modification involves setting the registry value DisableAntiSpyware to 0x00000001. This activity is significant because it directly impairs a critical security control, potentially allowing attackers to deploy ransomware, exfiltrate data, or further compromise the system without interference from the endpoint antivirus. The registry modification is typically performed post-exploitation, after an attacker has already gained initial access and established a foothold. Defenders must monitor registry modifications to detect and prevent this form of defense evasion.
Attack Chain
- Initial access is gained through an exploit or compromised credentials.
- The attacker executes code on the target system, potentially via PowerShell or cmd.exe.
- The attacker identifies the
DisableAntiSpywareregistry key location. - The attacker uses
reg.exeor PowerShell’sSet-ItemPropertyto modify the registry keyHKLM\SOFTWARE\Microsoft\Windows Defender\DisableAntiSpyware. - The
DisableAntiSpywarevalue is set to0x00000001, disabling Windows Defender. - The attacker verifies that Windows Defender is disabled by checking its status.
- The attacker proceeds with lateral movement, privilege escalation, or data exfiltration without AV interference.
- Finally, the attacker deploys ransomware, encrypting files and demanding ransom payment.
Impact
Successful disabling of Windows Defender allows attackers to operate unimpeded on the compromised system. This can lead to the complete encryption of critical files, resulting in significant data loss and operational disruption. Organizations affected by Ryuk ransomware have experienced substantial financial losses, reputational damage, and extensive recovery efforts. Disabling antivirus solutions is a common step in ransomware deployment, increasing the likelihood of a successful attack and maximizing the damage caused.
Recommendation
- Deploy the Sigma rule
Detect Windows Defender DisableAntiSpyware Registry Modificationto your SIEM to identify registry modifications indicative of this attack. - Enable Sysmon Event ID 13 logging to capture registry modification events on endpoints.
- Investigate any alerts generated by the Sigma rule
Detect Suspicious Process Modifying Windows Defender Registryto determine the legitimacy of the registry change. - Implement strict access control policies to prevent unauthorized registry modifications.
- Monitor endpoints for unusual process behavior after the registry key is modified.
Detection coverage 2
Detect Windows Defender DisableAntiSpyware Registry Modification
highDetects modification of the Windows Registry key DisableAntiSpyware to disable Windows Defender.
Detect Suspicious Process Modifying Windows Defender Registry
mediumDetects processes that are not expected to modify the Windows Defender DisableAntiSpyware registry key.
Detection queries are kept inside the platform. Get full rules →