Windows Defender Controlled Folder Access Disabled via Registry Modification
An attacker modifies the Windows registry to disable Windows Defender Controlled Folder Access, a defense evasion technique that weakens protections against unauthorized access and ransomware.
This analytic detects a modification in the Windows registry that disables the Windows Defender Controlled Folder Access (CFA) feature. The detection leverages Sysmon Event ID 13 to monitor changes to the EnableControlledFolderAccess registry setting. Disabling CFA is a significant defense evasion technique because it weakens a key security feature designed to protect critical folders from unauthorized access, including ransomware attacks. This allows attackers to potentially bypass this security measure and access or modify sensitive files. This behavior has been linked to malware such as BlankGrabber Stealer and used to bypass endpoint protection.
Attack Chain
- An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).
- The attacker escalates privileges to gain administrative rights necessary to modify the registry.
- The attacker uses a script or executable (e.g., PowerShell,
reg.exe) to modify the registry. - The attacker targets the registry key
*\Windows Defender\Windows Defender Exploit Guard\Controlled Folder Access\EnableControlledFolderAccess. - The attacker sets the registry value to
0x00000000to disable Controlled Folder Access. - The system no longer protects designated folders from unauthorized access by untrusted applications.
- The attacker deploys ransomware or exfiltrates sensitive data from previously protected folders.
Impact
Successful disabling of Controlled Folder Access significantly weakens the endpoint’s defenses, leaving critical folders vulnerable to unauthorized access and modification. This can lead to successful ransomware deployment, data theft, and other malicious activities. Without CFA, common attack vectors are unhindered, increasing the likelihood of data breaches and system compromise.
Recommendation
- Enable Sysmon Event ID 13 to monitor registry modifications, specifically changes to the
EnableControlledFolderAccesskey, to detect attempts to disable Controlled Folder Access. - Deploy the provided Sigma rules to your SIEM to detect registry modifications that disable Controlled Folder Access and tune for your environment.
- Investigate any detected instances of
EnableControlledFolderAccessbeing set to0x00000000to determine if the activity is malicious. - Review and enforce Group Policy settings to prevent users or processes from disabling Controlled Folder Access.
Detection coverage 2
Windows Defender Controlled Folder Access Disabled
highDetects when Windows Defender Controlled Folder Access is disabled via registry modification.
Process Modifying CFA Registry Key
mediumDetects the process responsible for modifying the Windows Defender Controlled Folder Access registry key.
Detection queries are kept inside the platform. Get full rules →