Windows Defender MpEngine Disabled via Registry Modification
An attacker modifies the Windows Defender MpEngine registry value to disable key features, potentially allowing malware to evade detection.
Attackers, particularly those associated with IcedID campaigns, may attempt to disable Windows Defender to evade detection. This involves modifying the MpEnablePus registry value within the Windows Defender MpEngine settings, specifically setting it to 0x00000000. This action effectively disables key features of Windows Defender, creating a window of opportunity for malware to execute undetected. The observed registry modification is a strong indicator of malicious intent, allowing attackers to gain a foothold and further compromise the system. The DFIR Report has documented instances of this technique being used in conjunction with IcedID leading to XingLocker ransomware deployment.
Attack Chain
- Initial access is gained through an unknown method (e.g., phishing, exploit).
- The attacker obtains elevated privileges on the compromised system.
- The attacker modifies the registry value
MpEnablePusto0x00000000under the pathHKLM\Software\Policies\Microsoft\Windows Defender\MpEngine. - This registry change disables key Windows Defender features, weakening the endpoint’s defenses.
- The attacker deploys malware, such as IcedID, which can now operate with reduced interference from the disabled security product.
- The malware establishes persistence through various mechanisms (e.g., scheduled tasks, registry run keys).
- The attacker performs reconnaissance to identify valuable data and systems within the network.
- The attacker moves laterally to other systems, potentially deploying ransomware such as XingLocker.
Impact
Successful disabling of Windows Defender can lead to widespread malware infection and data compromise. Organizations may experience data breaches, financial losses, and reputational damage. The IcedID malware has been linked to XingLocker ransomware deployment, demonstrating the potential for significant impact following a successful attack. Disabling Windows Defender increases the dwell time of attackers and the likelihood of successful lateral movement and data exfiltration.
Recommendation
- Enable Sysmon EventID 13 to capture registry modifications on endpoints.
- Deploy the Sigma rule “Detect Defender MpEngine Disabled via Registry Modification” to identify suspicious registry changes related to Windows Defender.
- Investigate any alerts generated by the Sigma rule, prioritizing systems where other suspicious activities have been observed.
- Ensure Sysmon TA version 2.0 or higher is installed for accurate registry monitoring.
- Review and harden Windows Defender configuration policies to prevent unauthorized modifications of critical settings.
Detection coverage 2
Detect Defender MpEngine Disabled via Registry Modification
highDetects attempts to disable Windows Defender by modifying the MpEnablePus registry value.
Detect Suspicious Process Modifying Windows Defender Registry
mediumDetects a process modifying the Windows Defender MpEngine registry that is not a known system process.
Detection queries are kept inside the platform. Get full rules →