Skip to content
Threat Feed
high advisory

Windows Defender Real-time Signature Delivery Disabled via Registry Modification

The following analytic detects modifications to the Windows registry that disable the Windows Defender real-time signature delivery feature, preventing timely malware definition updates and potentially leading to system compromise.

This threat brief addresses the risk of adversaries disabling Windows Defender’s real-time signature delivery mechanism. Attackers may modify specific registry entries to prevent Windows Defender from receiving the latest malware definitions. This activity significantly reduces the effectiveness of the endpoint security solution, creating a window of opportunity for malware to infect the system undetected. Disabling real-time signature delivery is a common defense evasion technique that allows malicious actors to bypass signature-based detection and establish a persistent presence on compromised systems. The technique is tracked as T1562.001 in MITRE ATT&CK. The provided detections focus on registry modifications associated with the Windows Defender signature updates path.

Attack Chain

  1. Attacker gains initial access to the system, possibly through phishing or exploiting a software vulnerability.
  2. Attacker escalates privileges to gain administrative rights, required to modify the registry.
  3. Attacker uses a command-line tool like reg.exe or PowerShell to modify the registry.
  4. The attacker targets the specific registry path *\\Windows Defender\\Signature Updates\\RealtimeSignatureDelivery.
  5. The attacker sets the registry_value_data to "0x00000000", effectively disabling real-time signature updates.
  6. Windows Defender no longer receives timely signature updates.
  7. Malware is executed on the system, bypassing signature-based detection.
  8. The attacker establishes persistence and performs malicious activities, such as data exfiltration or lateral movement.

Impact

Successful disabling of real-time signature delivery significantly weakens endpoint protection. Without timely signature updates, Windows Defender becomes unable to detect the latest malware variants. This can lead to widespread infection within the organization, potentially affecting hundreds or thousands of endpoints. Data breaches, financial losses, and reputational damage are likely consequences. The lack of real-time protection can also enable ransomware attacks and other destructive activities.

Recommendation

  • Enable Sysmon Event ID 13 to monitor registry modifications.
  • Deploy the Sigma rule “Windows Defender Realtime Signature Delivery Disabled via Registry” to detect registry changes disabling real-time signature delivery, and tune the rule for your environment.
  • Investigate any alerts generated by the Sigma rule, prioritizing systems where other suspicious activities have been observed.
  • Review and harden Group Policy settings to prevent unauthorized registry modifications.
  • Use the filter macro in the provided Splunk search to tune the search and reduce false positives.

Detection coverage 2

Windows Defender Realtime Signature Delivery Disabled via Registry

high

Detects registry modifications that disable Windows Defender real-time signature delivery by monitoring changes to the registry path associated with Windows Defender signature updates. Disabling this feature can prevent timely malware definition updates.

sigma tactics: defense_evasion techniques: T1562.001 sources: registry_set, windows

Suspicious Process Modifying Windows Defender Signature Update Registry

medium

Detects a suspicious process modifying the Windows Defender signature update registry key.

sigma tactics: defense_evasion techniques: T1562.001 sources: registry_set, windows

Detection queries are kept inside the platform. Get full rules →