Windows Defender BlockAtFirstSeen Feature Disabled via Registry Modification
An attacker modifies the Windows Registry to disable the Windows Defender BlockAtFirstSeen feature, potentially allowing malware to bypass initial detection and increasing the risk of system compromise.
This threat brief addresses the disabling of the Windows Defender BlockAtFirstSeen feature through registry modification. The BlockAtFirstSeen feature provides initial protection against new and unknown threats. Attackers may disable this feature to bypass these initial detection mechanisms, increasing the likelihood of successful malware execution and subsequent system compromise. The analytic detects modifications to the DisableBlockAtFirstSeen registry value under the Microsoft\Windows Defender\SpyNet path. The activity is significant because it weakens the endpoint’s security posture, creating an opportunity for malware to execute undetected. Observed in attacks such as IcedID, this technique can lead to ransomware deployment and data breaches.
Attack Chain
- Initial access is gained through methods such as phishing or exploitation of vulnerabilities.
- The attacker executes code on the target system.
- The attacker identifies the registry key associated with Windows Defender SpyNet:
HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet. - The attacker modifies the
DisableBlockAtFirstSeenvalue within the SpyNet registry key. - The
DisableBlockAtFirstSeenvalue is set to0x00000001to disable the feature. - Windows Defender no longer blocks the execution of files based on reputation.
- The attacker executes malicious payloads that would normally be blocked.
- The attacker achieves their objective, such as deploying ransomware, exfiltrating data, or establishing persistence.
Impact
Disabling the BlockAtFirstSeen feature significantly reduces the effectiveness of Windows Defender, potentially exposing systems to new and unknown malware threats. Successful exploitation can lead to malware infection, system compromise, data breaches, and ransomware deployment. The DFIR Report has observed this technique being used in conjunction with IcedID leading to Xinglocker ransomware deployment.
Recommendation
- Deploy the Sigma rule
Registry Modification to Disable BlockAtFirstSeento your SIEM to detect this specific registry modification. - Enable Sysmon Event ID 13 (Registry Event) logging to collect the necessary data for the Sigma rules.
- Investigate any detected instances of
DisableBlockAtFirstSeenregistry value modification, prioritizing those occurring on critical systems. - Enforce strict access control policies to prevent unauthorized modification of registry settings.
- Monitor systems for signs of malware infection following any detected attempts to disable the BlockAtFirstSeen feature.
Detection coverage 2
Registry Modification to Disable BlockAtFirstSeen
highDetects modification of the DisableBlockAtFirstSeen registry value to disable the Windows Defender feature.
Process Modifying Defender BlockAtFirstSeen Registry
mediumDetects processes that are modifying the DisableBlockAtFirstSeen registry value.
Detection queries are kept inside the platform. Get full rules →