Windows Defender Infection Reporting Disabled via Registry Modification
Attackers modify the Windows registry to disable Windows Defender's infection reporting, preventing detailed threat information from reaching Microsoft and potentially allowing malware to evade detection.
This brief addresses a technique where attackers modify the Windows registry to disable Windows Defender’s infection reporting mechanism. The specific registry key targeted is “DontReportInfectionInformation” under the “Microsoft\MRT” path. By setting the value of this key to “0x00000001”, attackers can prevent Windows Defender from sending detailed threat information to Microsoft, hindering effective threat analysis and response. This activity, often performed post-compromise, is intended to evade detection and maintain persistence within the compromised environment. The privacy.sexy project, a known tool for modifying Windows settings, can be used to perform this action. Disabling this feature increases the attacker’s chances of successfully executing their objectives without being detected.
Attack Chain
- Initial compromise of the system through unspecified means.
- Attacker gains elevated privileges to modify the registry.
- The attacker uses a tool or script to modify the
DontReportInfectionInformationregistry key. - The registry value data for
HKLM\SOFTWARE\Microsoft\MRT\DontReportInfectionInformationis set to0x00000001. - Windows Defender is no longer able to report detailed infection information to Microsoft.
- Malware operates without triggering detailed reporting, evading detection.
- The attacker establishes persistence on the system.
- The attacker performs lateral movement or data exfiltration.
Impact
Disabling Windows Defender’s infection reporting prevents crucial threat data from reaching Microsoft, hindering global threat intelligence efforts. On individual systems, this can lead to prolonged malware infections, data breaches, and unauthorized access. Since Windows Defender is a default security control on Windows systems, disabling its reporting mechanisms can significantly degrade the overall security posture. If successful, attackers can maintain persistence, move laterally within the network, and exfiltrate sensitive data without triggering alerts based on standard threat reporting.
Recommendation
- Deploy the provided Sigma rule to your SIEM to detect modifications to the
DontReportInfectionInformationregistry key (see “Detect Windows Defender Infection Reporting Disabled”). - Investigate any alerts generated by the Sigma rule to determine if the modification was legitimate or malicious.
- Implement strict access controls to limit registry modification privileges to authorized users and processes only.
- Monitor for processes accessing and modifying registry keys related to Windows Defender configuration (see “Detect Processes Modifying Windows Defender Settings”).
- Enable Sysmon Event ID 13 to collect registry modification events on endpoints.
Detection coverage 2
Detect Windows Defender Infection Reporting Disabled
highDetects modification of the DontReportInfectionInformation registry key to disable Windows Defender infection reporting.
Detect Processes Modifying Windows Defender Settings
mediumDetects processes attempting to modify Windows Defender settings through registry changes.
Detection queries are kept inside the platform. Get full rules →