Windows Defender Antivirus Disabled via Registry Modification
Attackers modify Windows Defender registry settings to disable antivirus and antispyware protections, evading detection and maintaining persistence.
Attackers commonly disable Windows Defender to evade detection and maintain persistence on compromised systems. This involves modifying specific registry keys associated with Windows Defender policies. The activity is significant because disabling antivirus protections allows attackers to execute further malicious activities undetected, leading to potential data breaches, system compromise, and further propagation of malware within the network. This technique has been observed in campaigns involving malware families such as IcedID, Black Basta ransomware, and Cactus ransomware. Detection of this behavior is crucial for identifying and mitigating potential threats early in the attack chain.
Attack Chain
- Initial access is gained through various methods, such as phishing or exploiting vulnerabilities.
- The attacker obtains administrative privileges on the target system.
- The attacker uses tools like
reg.exeor PowerShell to modify the registry. - The registry key
HKLM\SOFTWARE\Policies\Microsoft\Windows Defenderis targeted. - The
DisableAntiSpywarevalue is set to0x00000001to disable antispyware. - The
DisableAntiVirusvalue is set to0x00000001to disable antivirus. - Windows Defender is effectively disabled, allowing malware execution without detection.
- The attacker proceeds with further malicious activities, such as data exfiltration or ransomware deployment.
Impact
Successful disabling of Windows Defender can lead to complete system compromise. Attackers can install malware, exfiltrate sensitive data, or deploy ransomware without interference. This can result in significant financial losses, reputational damage, and operational disruption. Observed instances of this technique have been linked to IcedID infections leading to XingLocker ransomware deployment, as well as other ransomware families like Black Basta and Cactus.
Recommendation
- Enable Sysmon EventID 13 logging to capture registry modification events.
- Deploy the Sigma rules provided in this brief to detect the specific registry modifications.
- Investigate any alerts triggered by the Sigma rules, focusing on the involved processes and users.
- Review and harden Windows Defender Group Policy settings to prevent unauthorized modifications.
- Reference the Sigma rule tags to understand which analytic stories are related to this activity (e.g. IcedID, Black Basta, Cactus).
Detection coverage 2
Disable AntiSpyware via Registry
highDetects modification of the DisableAntiSpyware registry value to disable Windows Defender antispyware.
Disable AntiVirus via Registry
highDetects modification of the DisableAntiVirus registry value to disable Windows Defender antivirus.
Detection queries are kept inside the platform. Get full rules →