Windows Defender Web Content Evaluation Disabled via Registry Modification
An attacker modifies the Windows registry to disable Windows Defender web content evaluation, potentially allowing malicious web content to bypass security checks and compromise the system.
Attackers can disable Windows Defender’s web content evaluation feature by modifying the EnableWebContentEvaluation registry entry. This defense evasion technique, often employed post-compromise, allows malicious web content to bypass security checks, increasing the risk of system exploitation. Disabling this feature is not a common practice in standard Windows system administration and its presence is a strong indicator of malicious activity. This activity matters for defenders, as it weakens the overall security posture of the system, making it more susceptible to web-based attacks.
Attack Chain
- Initial access to the system is achieved through an existing compromise or vulnerability exploitation.
- The attacker gains elevated privileges to modify the registry.
- The attacker uses a process (e.g.,
reg.exe,powershell.exe) to modify the registry keyHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost\EnableWebContentEvaluation. - The
EnableWebContentEvaluationvalue is set to0x00000000, disabling the web content evaluation feature. - The system is now more susceptible to web-based attacks, as malicious scripts and unsafe web elements can bypass security checks.
- The attacker leverages the weakened security posture to execute malicious code or exfiltrate sensitive data.
- The attacker maintains persistence by ensuring the registry modification remains in place.
Impact
Disabling Windows Defender’s web content evaluation feature exposes systems to a higher risk of web-based attacks. Successful exploitation could lead to malware infection, data theft, or complete system compromise. The impact is significant, as it weakens a key security control, potentially affecting numerous users and systems within an organization.
Recommendation
- Enable Sysmon Event ID 13 to monitor registry modifications and activate the provided Sigma rules (process_creation and registry_set).
- Deploy the provided Sigma rules to your SIEM to detect attempts to disable web content evaluation via registry modifications and tune for your environment.
- Investigate any alerts triggered by the Sigma rules, focusing on the processes responsible for the registry changes (process_creation, registry_set).
- Consider using the provided filter macro to tune the search to reduce false positives based on your environment.
Detection coverage 2
Detect Registry Modification to Disable Web Content Evaluation (Process Creation)
highDetects processes modifying the registry to disable Windows Defender web content evaluation.
Detect Registry Modification to Disable Web Content Evaluation (Registry Event)
highDetects registry events indicating the disabling of Windows Defender web content evaluation.
Detection queries are kept inside the platform. Get full rules →