Windows Defender Application Guard Auditing Disabled via Registry Modification
Attackers modify the Windows Registry to disable auditing for Windows Defender Application Guard, hindering security monitoring and enabling malicious activity to go unnoticed.
This brief focuses on a technique where attackers disable Windows Defender Application Guard auditing by modifying specific registry keys. The attack involves setting the registry value AuditApplicationGuard to 0x00000000. This action is performed to impair defenses and evade detection by preventing security monitoring tools from logging malicious activities within the isolated Application Guard environment. The described registry modification is typically performed post-exploitation to facilitate persistence or lateral movement without triggering alerts, and can lead to unauthorized access and data exfiltration. This technique has been observed being discussed in the security research community as a method to bypass security controls.
Attack Chain
- Initial access to the system is achieved through unspecified means, such as exploiting a vulnerability or using stolen credentials.
- The attacker elevates privileges to gain administrative access required to modify the registry.
- The attacker uses a tool like
reg.exe,powershell, or custom malware to modify the registry. - The attacker navigates to the registry path
*\Policies\Microsoft\AppHVSI\. - The attacker modifies the
AuditApplicationGuardregistry value name. - The attacker sets the
AuditApplicationGuardregistry value data to0x00000000, disabling Application Guard auditing. - With auditing disabled, malicious activities within the Application Guard environment go unmonitored.
- The attacker performs actions such as lateral movement or data exfiltration.
Impact
Disabling Windows Defender Application Guard auditing allows attackers to operate within the isolated environment without generating security logs, making it difficult to detect and respond to their activities. If successful, this attack can lead to unauthorized access, data exfiltration, or further system compromise. The registry modification affects all systems where Windows Defender Application Guard is enabled and configured to use auditing.
Recommendation
- Deploy the Sigma rule
Registry Modification to Disable Application Guard Auditingto your SIEM and tune for your environment to detect this specific registry modification. - Enable Sysmon Event ID 13 to capture registry modifications, as specified in the detection logic.
- Investigate any alerts generated by the Sigma rule, focusing on the process responsible for the registry modification and the user context.
- Monitor for unexpected processes modifying registry keys related to Windows Defender policies.
Detection coverage 2
Registry Modification to Disable Application Guard Auditing
highDetects modifications to the Windows registry that disable Windows Defender Application Guard auditing by setting the AuditApplicationGuard value to 0.
Process Modifying Application Guard Registry Keys
mediumDetects processes that modify registry keys associated with Windows Defender Application Guard settings.
Detection queries are kept inside the platform. Get full rules →